Protect Against Russia-Ukraine Cyber Activity
  • Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Network Security
  • Secure Access Service Edge
  • Cloud-Native Security
  • Security Operations
  • Threat Intel & Incident Response
  • More
  • Sign In
    Sign In
    • Research
    • Partner
    • Customer
    • Employee
  • Create Account
  • EN
    Language
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Get Started

What is a Botnet?

A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker.
See more

What is the Difference between FISMA and FedRAMP?

To deliver cloud-based services to the government, it’s important to have an understanding of government-enacted Federal IT compliance standards
See more
Displaying 61 - 90 of 135
  • 1
  • 2
  • 3
  • 4
  • 5

Infographic

Which Cloud Defender Are You?

Learn how Zero Trust Network Access provides an integrated, comprehensive solution for segmentation, access control, and threat prevention in this interactive.
June 29, 2020

White Paper

Palo Alto Networks Prisma Access and Cradlepoint NetCloud Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the Palo Alto Networks Prisma Access and Cradlepoint NetCloud Solution Brief
June 25, 2020

Other

Reference Architecture for OT and IoT Device Security in Industrial Control Systems

This document provides a high-level reference architecture for OT and IoT device security in Industrial Control Systems (ICS) using Palo Alto Networks’ Next-generation firewalls, the Cortex Data Lake, and IoT Security Service.
June 17, 2020

Other

Prisma Cloud NIST SP 800-190: At a Glance

The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-190 provides guidance on securing application containers and related ecosystem components. While it thoroughly describes the security risks and associated countermeasures for protecting containerized apps, it leaves organizations to fend for themselves on the tactical front. Twistlock is a purpose-built software suite for securing cloud-native workloads. From the beginning, we’ve been developing technology to address the types of risks NIST SP 800-190 describes.
June 12, 2020

White Paper

Government Use Case: Network Security Consolidation

As Governments adopt digital technologies – employee remote access, citizen self-service, SaaS, cloud, and more – these same technologies introduce new points where the network can be infiltrated, and new valuable data that must be secured. The result was a cyber security arms race where new threats were countered with new security point products. Today, governments are consolidating security appliances and functions to gain better visibility and use scarce cybersecurity professionals wisely. Read this use case to discover • The advantages of a platform approach to network security consolidation. • Best practices for deployment. • How a government agency eliminated 10 security appliances at every location, simplifying compliance, management and reporting while improving security.
May 6, 2020

Use Case

Automating Cyber Operations

To gain, maintain, and expand competitive advantage over adversaries in a new digital operating environment, SOCs must be capable of seamlessly employing, integrating, and automating its capabilities across all environments and in any domain.
April 22, 2020

White Paper

Guidance for the US Government on Zero Trust

Learn about how the Federal Government faces unique challenges regarding Zero Trust that commercial entities do not. While cybersecurity programs within the Federal Government are more mature and provide significant capability, many do not ad- dress the issue of inherit trust. Due to this, Zero Trust has gained momentum across the Federal Government.
April 9, 2020

White Paper

Federal Government Defense Security Reference Blueprint

This guide outlines the challenges Defense agencies face and methods they can use to integrate the Palo Alto Networks ecosystem into the Federal Enterprise Architecture (FEA) to fight modern threats, meet current and future security objectives, and improve cyber resilience and operations.
April 6, 2020

Datasheet

Centralized Cloud Visibility

Discover best practices to enable visibility and reduce risk in multi-cloud environments.
January 8, 2020

Infographic

Top Cloud Security Concerns for Federal Agencies

Top cloud security risks and concerns for Federal Agencies and how Palo Alto Networks help address those concerns.
January 8, 2020

Guide

At a Glance: WildFire: U.S. Government malware prevention service

Learn how this industry-leading malware prevention service built for the U.S. government prevents highly evasive zero-day threats and malware from impacting agencies.
January 7, 2020

Video

Securing Branch Offices with Prisma

Learn how Prisma can help secure your branch offices through cloud-delivered security in this short video.
October 9, 2019

White Paper

Maximaler ROI bei Erkennung und Abwehr

Ein erfolgreiches Cybersicherheitsprogramm beginnt mit den richtigen Tools für die Erkennung und Abwehr. Mit diesen können Sicherheitsteams Bedrohungen schnell erkennen, untersuchen und eindämmen.
September 30, 2019

White Paper

最大化检测和响应的 投资回报率

通过整合不同的工具并简化运营,从而节省 44% 的成本
September 30, 2019

White Paper

Détection et réponse : optimisez votre ROI

Consolidez vos outils et simplifiez vos opérations pour réduire vos coûts de 44 %
September 30, 2019

White Paper

Maximice el ROI de Detección y Respuesta

Reduzca los Costos en un 44 % Mediante la Consolidación de Herramientas y la Optimización de las Operaciones.
September 30, 2019

White Paper

Maximize the ROI of Detection and Response

Download this white paper to learn how to maximize the ROI and cut the cost of detection and response.
September 30, 2019

White Paper

Maximize the ROI of Detection and Response

Download this white paper to learn how to maximize the ROI and cut the cost of detection and response.
September 30, 2019

White Paper

Maximice el ROI de Detección y Respuesta

Reduzca los Costos en un 44 % Mediante la Consolidación de Herramientas y la Optimización de las Operaciones.
September 30, 2019

White Paper

Rentabilice al máximo su inversión en detección y respuesta

Un programa de operaciones de seguridad eficaz pasa en primer lugar por elegir las herramientas de detección y respuesta adecuadas. Con ellas, los equipos de seguridad pueden detectar, investigar y contener rápidamente las amenazas.
September 30, 2019

White Paper

最大化偵測與回應的 投資報酬率

本白皮書將證明一家擁有 10,000 名使用者的企業,如何可以使用 Cortex XDR來取代孤立的偵測與回應工具,保護其企業避免遭受代價高昂的入侵,同時節 省 44% 或平均 889,284 美元的成本。
September 30, 2019

White Paper

Maximize o ROI em detecção e resposta

A criação de um programa bem-sucedido de operações de segurança começa com as ferramentas corretas de detecção e resposta. Essas ferramentas podem ajudar as equipes de segurança a descobrir, investigar e conter ameaças rapidamente.
September 30, 2019

White Paper

탐지 및 대응에 대한 ROI 극대화하기

성공적인 보안 운영 프로그램의 구축은 올바른 탐지 및 대응 도구에서 시작합니다. 이러한 도구는 보안팀이 신속하게 위협을 발견, 조사, 억제할 수 있도록 합니다.
September 30, 2019

White Paper

検出と対応の ROI を 最大化する

成功するセキュリティ運用プログラムを構築するには、適切な検出および対応ツールを使用することか ら始めます。こうしたツールは、セキュリティ チームが脅威をすばやく検出、調査し、封じ込めるのに 役立ちます。
September 30, 2019

Event

PALO ALTO NETWORKS NGFW ULITMATE TEST DRIVE BY PRESIDIO

Interested in taking a Palo Alto Networks Next-Generation Firewall for a test drive? Presidio invites you to experience an Ultimate Test Drive. You’ll get hands-on experience with the Palo Alto Networks NGFW, the cornerstone of the Security Operating Platform.   This is a no-cost half-day technical workshop dedicated to restoring visibility and control over the applications, users and content traversing your network. In this workshop you will learn how to:     Establish application policies based on users and groups Enable specific application features while restricting others Configure a policy for decrypting, inspecting, and allowing SSL Secure mobile devices using GlobalProtect   These classes are hugely popular and spaces fill up quickly. Register now to save your place at the next Ultimate Test Drive.    We look forward to putting you in the driver’s seat. PLEASE NOTE: This workshop requires attendees to bring their own laptops with an RDP client installed.
Ultimate Test Drive
Atlanta ,GA ,United States
September 18, 2019
11:00 AM EDT

White Paper

セキュアトランスフォーメーション: Prisma Access による リモート アクセスVPN の置き換え

モバイル ワーカーやクラウドベース アプリケーションの急増により、リモート アクセスVPN はクラウドに最適でもなければ、セキュアでもないことがわかりつつあります。そのため、現在のアプリケーション ミックスを考慮した新しいアプローチが必要です。
September 9, 2019

White Paper

Transformation sécurisée : Prisma Access remplace les accès distants par VPN

Face à l’explosion du nombre de collaborateurs mobiles et d’applications cloud, les entreprises ne peuvent que constater que les accès VPN ne sont ni sécurisés ni optimisés pour le cloud. La mixité actuelle des parcs applicatifs impose d’adopter une nouvelle approche.
September 9, 2019

White Paper

Protección de SD-WAN con Security Operating Platform

Palo Alto Networks brinda seguridad para proteger entornos SD-WAN.
September 6, 2019

White Paper

Protegendo o SD-WAN com a Security Operating Platform

A Palo Alto Networks oferece segurança para proteger ambientes SD-WAN
September 6, 2019

White Paper

SD-WAN-Schutz mit der Security Operating Platform

Palo Alto Networks stellt Sicherheitslösungen zum Schutz von SD-WAN-Umgebungen bereit.
September 6, 2019
Displaying 61 - 90 of 135
  • 1
  • 2
  • 3
  • 4
  • 5

Get the latest news, invites to events and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Tech Insider
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Newsroom
  • Careers
  • Contact Us
  • Product Certifications
  • Manage Email Preferences
Report a Vulnerability
Create an account or login

Copyright © 2022 Palo Alto Networks. All rights reserved