Globe Telecom, the largest mobile operator in the Philippines, set the foundation for robust technology infrastructure in 2014 when its board envisioned the need to take steps to fortify its cybersecurity.
The Bourse de Casablanca has standardised on an intelligent Palo Alto Networks network security solution to enable a secure and reliable resilient trading platform.
Achieve digital branch transformation with a secure, seamless, optimized experience for all users—regardless of their location—while reducing cost and complexity
A primary challenge that needed to be addressed was the extensive visibility delivered with Prisma Cloud, which in turn, can produce significant alerting noise. The organization wanted to maintain tight control of its alerting volumes through proactive policy management.
Palo Alto Networks Cortex XDR™ enables you to satisfy multiple PCI DSS requirements and bolster your security posture with one integrated solution for prevention, detection, and response across your enterprise. Cortex XDR is the industry’s first extended detection and response platform that prevents advanced malware, exploits, and fileless attacks while also integrating endpoint, network, and cloud data to stop sophisticated attacks.
Palo Alto Networks partnered with Ngern Tid Lor Public Company Limited, a leading Thai microfinance company to optimise their security and protect its customer data and applications.
After more than three decades, Naranja X, Argentina's largest credit card issuer, has reinvented itself to become a FinTech with a bright future ahead.
The East Coast US bank gains a single-pane view, prioritizes
high-ranking traffic, and cuts support costs in half with
Palo Alto Networks Prisma® SD-WAN
Jefferies early investment in Prisma® Access, the best-in-class,
cloud-delivered security platform from Palo Alto Networks®, enabled
a mobile workforce to persevere and prosper without missing a beat
through the pandemic.
When a financial services management firm was attacked by a state-sponsored threat actor and its customers lost substantial funds, the company turned to Palo Alto Networks Unit 42 Incident Response team to identify the point of entry and attack chain leveraged by the threat actor.
Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls.
Globe Telecom, the largest mobile operator in the Philippines, set the foundation for robust technology infrastructure in 2014 when its board envisioned the need to take steps to fortify its cybersecurity.
A Zero Trust cybersecurity model, enabled by a modern Secure Access Services Edge (SASE) architecture, gives financial institutions powerful tools to support new ways of working without compromising their ability to compete and innovate.
Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls.
Find out why security program maturity correlates to operational excellence and enables more functionality and on-time product delivery.
Leverage the insights of a thousand seasoned security professionals. Access key benchmarks of the development processes toward a mature security program in this actionable e-book.
By Palo Alto Networks, Cortex is the industry’s most comprehensive security operations product portfolio with end-to-end solutions to address the unique needs and challenges facing the financial services industry. With Cortex, Security Operations professionals are proactive with security, not reactive. Learn more in this financial services solution brief.
Learn how 5G-Native Security protects all facets of the 5G infrastructure, including the user communications, applications, and data of business-critical enterprises, governments, as well as consumers.
Read this brief to understand the quantifiable business value a retail bank with 1,000 branches can realize with Prisma SD-WAN supporting their MPLS replacement effort.
The internet is a small place. Attackers can scan the internet in under an hour and get a list of every RDP, database, and abandoned web server out there
There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue patches to remediate flaws, many financial institutions do not apply all available patches to their production environments. In addition, when systems or applications reach their end-of-support, they no longer receive vulnerability patches from their vendors. These two scenarios describe the conditions under which a system or application is considered "unpatchable." When patching or upgrading is no longer feasible, security professionals need to identify alternative ways to secure the unpatchable systems and applications to support their ongoing use in the environment.