See our SolarStorm response
  • Network Security
  • Cloud Security
  • Security Operations
  • More
  • Get support
  • Sign In
  • Get Started

What is a Botnet?

A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker.
See more

What is the Difference between FISMA and FedRAMP?

To deliver cloud-based services to the government, it’s important to have an understanding of government-enacted Federal IT compliance standards
See more
Displaying 1 - 30 of 132
  • 1
  • 2
  • 3
  • 4
  • 5

Datasheet

Public Sector Cloud Journey Overview

Helping Public Sector customers adopti cloud technologies both on premise and in the public cloud.
January 26, 2021

White Paper

Public Sector Cloud Journey Guidance

Helping to guide public sector customers through their cloud journey.
January 20, 2021

Use Case

Securing Networked Electronic Security Systems (ESS)

For many years, analog technology has been the reliable standard for Electronic Security Systems (ESS), however, in the digital age its performance has limitations.
January 15, 2021

Datasheet

Preparing for CMMC Solutions

Our portfolio of products can help support the CMMC compliance journey for any DIB organization.
January 7, 2021

Other

At a Glance: Cortex XDR for the US Government

Learn more about Cortex XDR extended detection and response platform, a cloud-delivered, FedRAMP Authorized environment.
December 8, 2020

Datasheet

Prisma Cloud: Cloud Security Posture Management in a FedRAMP Authorized environment

Gain consistent visibility and security across multi-cloud environments with a FedRAMP Authorized, cloud-delivered service
December 3, 2020

White Paper

Continuous Diagnostics and Mitigation (CDM) - at a Glance

This whitepaper describes how Palo Alto Networks provides an easy-to-use, cost-effective management environment that enables integrators and agencies to meet CDM requirements.
November 25, 2020

Datasheet

Continuous Authority to Operate Using Prisma Cloud

Prisma Cloud helps enable DevSecOps and containerized development, making it easier to achieve a continuous Authority to Operate (ATO).
September 4, 2020

Article

What is Cloud Security

Cloud Security is composed of various technologies and tools designed to protect each aspect of the shared responsibility model.
September 2, 2020

Article

Expanding Targets for New SunOrcal Malware Variant

Reaver malware family has shared command-and-control (C2) infrastructure overlap SunOrcal malware that has been used concurrently since late 2016.
September 2, 2020

Article

What is a Botnet?

A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker.
September 1, 2020

Article

What is the Difference between FISMA and FedRAMP?

To deliver cloud-based services to the government, it’s important to have an understanding of government-enacted Federal IT compliance standards
August 31, 2020

Use Case

Strengthen security with Zero Trust

Read this use case to discover how government agencies seek to limit the damage, withstand the impact, and decrease the effect of cyber attacks by pursuing a Zero Trust Architecture.
August 13, 2020

White Paper

Federal Cloud Journey Guidance

Helping to guide federal organizations as they continue to migrate to cloud environments.
July 27, 2020

White Paper

Federal Cloud Journey

Helping to guide federal organizations as they continue to migrate to cloud environments.
July 21, 2020

Video

Lightboard Series: VM-Series for Azure Overview

Lightboard Series: VM-Series for Azure Overview
July 14, 2020

Infographic

Which Cloud Defender Are You?

Learn how Zero Trust Network Access provides an integrated, comprehensive solution for segmentation, access control, and threat prevention in this interactive.
June 29, 2020

White Paper

Palo Alto Networks Prisma Access and Cradlepoint NetCloud Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the Palo Alto Networks Prisma Access and Cradlepoint NetCloud Solution Brief
June 25, 2020

Other

Reference Architecture for OT and IoT Device Security in Industrial Control Systems

This document provides a high-level reference architecture for OT and IoT device security in Industrial Control Systems (ICS) using Palo Alto Networks’ Next-generation firewalls, the Cortex Data Lake, and IoT Security Service.
June 17, 2020

Other

Prisma Cloud NIST SP 800-190: At a Glance

The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-190 provides guidance on securing application containers and related ecosystem components. While it thoroughly describes the security risks and associated countermeasures for protecting containerized apps, it leaves organizations to fend for themselves on the tactical front. Twistlock is a purpose-built software suite for securing cloud-native workloads. From the beginning, we’ve been developing technology to address the types of risks NIST SP 800-190 describes.
June 12, 2020

White Paper

Government Use Case: Network Security Consolidation

As Governments adopt digital technologies – employee remote access, citizen self-service, SaaS, cloud, and more – these same technologies introduce new points where the network can be infiltrated, and new valuable data that must be secured. The result was a cyber security arms race where new threats were countered with new security point products. Today, governments are consolidating security appliances and functions to gain better visibility and use scarce cybersecurity professionals wisely. Read this use case to discover • The advantages of a platform approach to network security consolidation. • Best practices for deployment. • How a government agency eliminated 10 security appliances at every location, simplifying compliance, management and reporting while improving security.
May 6, 2020

Use Case

Automating Cyber Operations

To gain, maintain, and expand competitive advantage over adversaries in a new digital operating environment, SOCs must be capable of seamlessly employing, integrating, and automating its capabilities across all environments and in any domain.
April 22, 2020

White Paper

Guidance for the US Government on Zero Trust

Learn about how the Federal Government faces unique challenges regarding Zero Trust that commercial entities do not. While cybersecurity programs within the Federal Government are more mature and provide significant capability, many do not ad- dress the issue of inherit trust. Due to this, Zero Trust has gained momentum across the Federal Government.
April 9, 2020

White Paper

Federal Government Defense Security Reference Blueprint

This guide outlines the challenges Defense agencies face and methods they can use to integrate the Palo Alto Networks ecosystem into the Federal Enterprise Architecture (FEA) to fight modern threats, meet current and future security objectives, and improve cyber resilience and operations.
April 6, 2020

Use Case

Federal Government: Multi-Cloud Security, Governance and Compliance

The federal governments will use cloud as a new foundation to build more effective security capabilities across domains - including cyberspace. An explosion of government adoption of public, private, hybrid, and cloud services have introduced new ways to scale and deliver efficient operations across multiple cloud platforms. As federal agencies continue to transition and expand their footprint into the cloud, it is critical to ensure these systems are secure and vulnerabilities are addressed immediately.
January 23, 2020

Use Case

Cloud Native Security Across The Software Lifecycle

Federal departments and agencies will use the cloud as a new foundation upon which to build more effective security across domains, including cyberspace.
January 20, 2020

Datasheet

Centralized Cloud Visibility

Discover best practices to enable visibility and reduce risk in multi-cloud environments.
January 8, 2020

Infographic

Top Cloud Security Concerns for Federal Agencies

Top cloud security risks and concerns for Federal Agencies and how Palo Alto Networks help address those concerns.
January 8, 2020

Guide

At a Glance: WildFire: U.S. Government malware prevention service

Learn how this industry-leading malware prevention service built for the U.S. government prevents highly evasive zero-day threats and malware from impacting agencies.
January 7, 2020

Book

BeyondCorp: A Step Towards Zero Trust for the Cloud

This eBook looks at BeyondCorp, how it works, its key principles, and how it applies towards implementing a comprehensive Zero Trust approach in the cloud.
October 18, 2019
Displaying 1 - 30 of 132
  • 1
  • 2
  • 3
  • 4
  • 5

Be the first to know.

As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
Subscription Reward

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube
Create an account or login

© 2021 Palo Alto Networks, Inc. All rights reserved.