Displaying 1 - 30 of 160
Event
Building a Super SOC with Cortex
Modern security threats are evolving at a faster pace than security technologies. Well-funded threat actors are investing in tools like machine learning (ML), automation and artificial intelligence (AI). SOCs with legacy technologies aren’t equipped to accurately detect and defend modern attacks. How can security technologies fight back? Join our upcoming live webinar to learn how you can transform SecOps to combat advanced attacks and improve efficiencies in your SOC and how you can supercharge your SOC with Cortex XDR®, XSOAR®, Xpanse® and XSIAM®. Find out more about: Today’s cyberthreats The challenges facing traditional SOCs 5 steps to building a super SOC 4 superpowers for building a resilient and effective SOC Register now and get ready to activate your SOC superpowers.
ON24 Webinar
Whitepaper
Prisma Cloud Goes FedRAMP High: Expanded Capabilities for the CISA’s CDM Program
In its commitment to be the government's cybersecurity partner of choice, Prisma Cloud and the entirety of Palo Alto Networks provides unparalleled support for federal organizations, with dedicated investment in creating tools for a safer and more secure digital world.
Article
What is a Botnet?
A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker.
Whitepaper
Army 2030 Network Requirements - Security & Data Analysis Whitepaper
Download our whitepaper that covers Army 2030's network needs: whole-network approaches, security, data analysis, and Zero Trust for military communications.
References and Case Studies
Protecting patients during the pandemic by securing the Internet of Medical Things
A healthcare provider relies on Palo Alto Networks to provide comprehensive medical IoT security
Datasheet
Prisma Cloud for Federal
Delivering code-to-cloud security for U.S. government multicloud environments.
Whitepaper
Enhance Your Cybersecurity Posture with the CIS Controls and Palo Alto Networks
A Blog outlining how the Center for Internet Security (CIS) developed controls to help enhance cybersecurity by sharing insights, tools and maping specific controls to various regulatory frameworks.
Research Reports
Frost Radar™: Cloud Workload Protection Platforms, 2023
Cloud workload protection platform (CWPP) solutions evaluated by Frost and Sullivan in the 2023 Frost Radar report help organizations match the CWPP to their needs.
Video
Securing the Future: Leadership Lessons in Building Secure Operations
FedTalks 2023, Presented by FedScoop. Live from the Waldorf Astoria in Washington, D.C..
Whitepaper
AI & The Modern SOC: Winning Tomorrow’s Cyber Mission Through Advanced Capabilities
Advanced AI will radically change the nature of government operations, policy and security, including changing the capabilities of human teams.
Presentation
Protecting patients during the pandemic by securing the Internet of Medical Things
A large public sector healthcare organization had millions of unsecured IoMT and IoT devices jeopardizing patient care, data privacy, and network security.
Other
Secure Your Entire Organization with Cybersecurity Solutions That Work Better Together
Today’s organizations are complex, cloud-enabled, and continually transforming—with increasingly larger IT environments and more distributed endpoints.
References and Case Studies
Cómo han logrado ocho organizaciones transformar sus operaciones de seguridad con Cortex®
Los equipos del SOC necesitan inteligencia artificial (los modelos, recursos y datos) para automatizar la ciberseguridad y estar a la altura del volumen y el nivel de sofisticación de las amenazas presentes en las redes actuales.
References and Case Studies
Cómo ocho organizaciones transformaron sus operaciones de seguridad con Cortex®
Los equipos de SOC necesitan IA, modelos, recursos y datos adecuados, para automatizar la ciberseguridad a fin de controlar el volumen y la complejidad de las amenazas detectadas en sus redes en la actualidad.
References and Case Studies
Come otto organizzazioni hanno trasformato le proprie operazioni di sicurezza con Cortex®
I SOC hanno bisogno dell'intelligenza artificiale, con i modelli, le risorse e i dati giusti, per automatizzare la sicurezza informatica, in modo da poter gestire il volume e il livello di sofisticazione delle minacce che colpiscono oggi le nostre reti.
References and Case Studies
Como oito organizações transformaram suas operações de segurança com o Cortex®
As equipes de SOC precisam de IA — os modelos, os recursos e os dados certos — para automatizar a segurança cibernética para que possam lidar com o volume e a sofisticação das ameaças vistas nas redes hoje.
References and Case Studies
So haben acht Unternehmen ihre Security Operations mithilfe von Cortex® transformiert
SOC-Teams benötigen KI – mit den richtigen Modellen, Ressourcen und Daten –, um die Cybersicherheit zu automatisieren. Nur so können sie die schiere Menge und die Komplexität der Bedrohungen bewältigen, die heute in Netzwerken auftreten.
References and Case Studies
8 つの組織での CORTEX® による セキュリティ運用の 変革事例
今日のネットワークで見られる脅威の量と巧妙さにSOCチームが対処するにはサイバーセキュリティを自動化するAIが必要であり、それには適切なモデル、リソース、データが要求されます。
References and Case Studies
了解八家企业如何利用 Cortex® 转变安全运营方式
SOC 团队需要使用人工智能(即合适的模型、资源和数据)来自动保障网络安全,以便应对当今网络的威胁数量和复杂性。
References and Case Studies
八家企業如何使用 Cortex® 進行安全作業的轉型
SOC 團隊需要 AI (正確的模型、資源和數據) 自動實現網路安全性,藉以因應現在網路上出現的威脅數量和複雜度。
References and Case Studies
8곳의 기업에서 Cortex®를 통해 보안 운영을 혁신한 방법
SOC 팀은 적절한 모델, 리소스, 데이터를 갖춘 AI로 사이버 보안을 자동화하고 오늘날 네트워크에서 발견되는 위협의 양과 정교함을 처리할 수 있어야 합니다.
References and Case Studies
Comment huit entreprises ont transformé leurs opérations de sécurité avec Cortex®
Ce qu’il leur faut, c’est une intelligence artificielle combinant les bons modèles, les bonnes ressources et les bonnes données. Seule cette technologie leur permettra d’automatiser leur sécurité pour mieux faire face au volume et au niveau de sophistication des menaces qui planent sur les réseaux.
Whitepaper
Modernize federal operations and tackle cybersecurity complexity with Zero Trust
Keeping up with cyber threats in the highly regulated and cloud-enabled US Public Sector can be challenging.
Article
What is Cloud Security?
Cloud Security is composed of various technologies and tools designed to protect each aspect of the shared responsibility model.
Event
Public Sector Ignite '23
Public Sector Ignite '23 will bring together leading cybersecurity experts and government luminaries to explore what’s next in cybersecurity.
Live Event
Book
Ahead for SLED: Conversations with Security Leaders in State and Local Government
State, local, and education (SLED) organization’s IT and security teams face challenges with implementing security solutions while often dealing with limited budgets and staffing. Additionally, they must navigate rules and regulations at state and local levels, as well as federal regulations and requirements. This e-book showcases real-world conversations with SLED security leaders who discuss how Cortex XDR, Cortex XSOAR, and Cortex Xpanse help minimize those challenges via automation, analytics, and machine learning to transform their security operations.
References and Case Studies
How Eight Organizations Transformed Their Security Operations with Cortex
SOC teams need AI—the right models, resources, and data—to automate cybersecurity, so they can handle the volume and sophistication of the threats seen on networks today. Customers use Cortex to elevate their SOC teams and improve their results, all while making security more visible, comprehensive, and future-ready. Discover how.
Use Case
Cloud Native Security Across The Software Lifecycle
Federal departments and agencies will use the cloud as a new
foundation upon which to build more effective security across
domains, including cyberspace.
Article
Expanding Targets for New SunOrcal Malware Variant
Reaver malware family has shared command-and-control (C2) infrastructure overlap SunOrcal malware that has been used concurrently since late 2016.
Displaying 1 - 30 of 160