Displaying 1 - 30 of 140

White Paper

Streamline PCI Compliance With Next-Generation Security

Establishing, maintaining, and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for everyone in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as companies that store, process or transmit cardholder data (CHD) and/or sensitive authentication data. With approximately three hundred individual requirements to address, organizations subject to the standard have their work cut out for them. This white paper will explain how Palo Alto Networks® Next Generation Security Platform allows PCI system operators to significantly enhance security and exceed PCI DSS requirements through segmentation and mitigating risks of malware and unpatched systems.

References and Case Studies

Southern Nevada Health District

Southern Nevada Health District Maintains Delivery of Vital Public Health Services With Agile Transition to Secure Work-From-Home Model While Facing Frontline Battle of Global Pandemic

References and Case Studies

Teleflex

Read this case study to learn why Teleflex chose CloudGenix SD-WAN.

References and Case Studies

Samaritan Ministries International

Samaritan Ministries International Strengthens Endpoint Security with Cortex XDR Gains Near Real-Time Detection and Response While Enabling Staff Productivity

References and Case Studies

Think Whole Person Healthcare

Palo Atlo Networks Cortex XDR provides provides comprehensive detection and response across virtual desktop infrastructure, including advanced endpoint protection, behavioral analytics, and forensics.

White Paper

Palo Alto Networks and Medigate

Healthcare Device Identification, Classification, and Threat Prevention

Infographic

Which Cloud Defender Are You?

Learn how Zero Trust Network Access provides an integrated, comprehensive solution for segmentation, access control, and threat prevention in this interactive.

White Paper

Palo Alto Networks Prisma Access and Cradlepoint NetCloud Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.

White Paper

Security Reference Blueprint for Healthcare IT

Healthcare security reference blueprint

White Paper

How Palo Alto Networks supports the NIST Cybersecurity Framework

Since the release of the Cybersecurity Framework (CSF) by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk.

Use Case

Government use case: Maintain the integrity of election systems

Enable citizens to exercise their right to vote, preserve trust in the process, and meet recommendations and regulations for securing the vote.

Book

BeyondCorp: A Step Towards Zero Trust for the Cloud

This eBook looks at BeyondCorp, how it works, its key principles, and how it applies towards implementing a comprehensive Zero Trust approach in the cloud.

Video

Securing Branch Offices with Prisma

Learn how Prisma can help secure your branch offices through cloud-delivered security in this short video.

White Paper

Simplify Zero Trust Implementation Using A Five-Step Methodology

Building Zero Trust networks is actually simpler than building legacy networks. This 5-step methodology makes deploying Zero Trust networks manageable, cost effective and non-disruptive.

White Paper

五大步驟方法簡化零信任 實作

只需遵循五個步驟方法,即可輕鬆部署零信任網路。本白皮書將深入說明這些 步驟,並聚焦介紹 Palo Alto Networks 如何提供滿足各步驟所需的緊密整合平 台,從而簡化保護關鍵資產的程序。

White Paper

Simplify Zero Trust Implementation Using A Five-Step Methodology

Building Zero Trust networks is actually simpler than building legacy networks. This 5-step methodology makes deploying Zero Trust networks manageable, cost effective and non-disruptive.

White Paper

SIMPLIFICAR IMPLEMENTACIONES ZERO TRUST (CONFIANZA CERO) CON UNA METODOLOGÍA DE CINCO PASOS

Si sigue una metodología de cinco pasos, podrá implementar su red de Confianza Cero con facilidad. En este documento técnico, se proporciona una explicación exhaustiva de estos pasos y se demuestra cómo Palo Alto Networks proporciona una plataforma altamente integrada que se adapta a cada paso y, de esta forma, simplifica el proceso de protección de sus activos más importantes.

White Paper

5단계 방법으로 제로 트러스트 구현 간소화

아래의 5단계 방법은 제로 트러스트 네트워크의 손쉬운 구축을 지원합니다. 이 백서에서는 이러한 단계를 심층적으로 설명하고, Palo Alto Networks가 어떤 방식으로 각 단계에 맞춰 긴밀하게 통합된 플랫폼을 제공하여 중요한 자산을 보호하는 프로세스를 간소화하는지 자세히 살펴봅니다.

White Paper

EINFACHE ZERO-TRUSTIMPLEMENTIERUNG IN FÜNF SCHRITTEN

Für die Implementierung sind nur fünf Schritte erforderlich. In diesem Whitepaper beschreiben wir diese Schritte im Detail und erläutern, wie die integrierte Plattform von Palo Alto Networks in jeder Phase den notwendigen Schutz für Ihre kritischen Ressourcen bietet.

White Paper

SIMPLIFIQUE SU IMPLEMENTACIÓN ZERO TRUST (CONFIANZA CERO) CON UNA METODOLOGÍA EN CINCO PASOS

En este documento, le proponemos una metodología en cinco pasos que le facilitará la implementación de su red Zero Trust. Este informe técnico proporciona una descripción detallada de estos pasos y explica cómo Palo Alto Networks ofrece una plataforma perfectamente integrada que se ajusta a cada uno de ellos para simplificar la protección de sus activos más cruciales.

White Paper

ZERO TRUST : IMPLÉMENTATION SIMPLIFIÉE EN CINQ ÉTAPES

Pour simplifier de votre réseau Zero Trust, nous vous proposons une méthodologie en cinq étapes. Le présent livre blanc détaille chacune d’elles et vous explique comment la plateforme intégrée de Palo Alto Networks vous accompagne tout au long de ce parcours pour simplifier la protection de vos ressources stratégiques.

White Paper

Simplify Zero Trust Implementation Using A Five-Step Methodology

Building Zero Trust networks is actually simpler than building legacy networks. This 5-step methodology makes deploying Zero Trust networks manageable, cost effective and non-disruptive.

White Paper

利用五步法 简化零信任实施

遵循五步法,轻松支持零信任网络的部署。本白皮书详细介绍了这五个步骤, 并重点讲解 Palo Alto Networks 如何提供对应于每个步骤的紧密集成平台,以 此简化保护关键资产的流程。

White Paper

SIMPLIFICAR A IMPLEMENTAÇÃO DA CONFIANÇA ZERO COM UMA METODOLOGIA DE CINCO ETAPAS

Seguir uma metodologia de cinco etapas suporta a implementação de sua rede Confiança Zero com facilidade. Este artigo técnico fornece uma explicação detalhada dessas etapas e destaca como a Palo Alto Networks fornece uma plataforma totalmente integrada que se alinha a cada etapa, simplificando o processo de proteção de seus ativos essenciais.

White Paper

SIMPLIFICAR IMPLEMENTACIONES ZERO TRUST (CONFIANZA CERO) CON UNA METODOLOGÍA DE CINCO PASOS

Si sigue una metodología de cinco pasos, podrá implementar su red de Confianza Cero con facilidad. En este documento técnico, se proporciona una explicación exhaustiva de estos pasos y se demuestra cómo Palo Alto Networks proporciona una plataforma altamente integrada que se adapta a cada paso y, de esta forma, simplifica el proceso de protección de sus activos más importantes.

White Paper

5ステップ方法論によるゼロトラスト導入の簡素化

5 ステップ方法論に従うことは、ゼロトラスト ネットワークを容易に導入するための後ろ盾 となります。このホワイトペーパーでは、それらのステップについて詳しく説明し、パロアル トネットワークスが提供する、各ステップに従って緊密に統合されたプラットフォームによ り、重要な資産の保護プロセスがいかに簡素化されるかを明らかにします。

Video

Prisma Cloud: Security, Compliance and Threat Defense

Watch this video to understand how Prisma Cloud provides the context required to maintain compliance and comprehensively secure your multi-cloud environments, spanning AWS®, Azure and Google Cloud.

Datasheet

Vers un monde plus sûr

Le cloud fait aujourd’hui partie du paysage de l’entreprise. Selon Gartner, le marché total du cloud devrait passer de 182,4 milliardsde dollars en 2018 à 331,2 milliards de dollars en 2022, soit un taux de croissance annuel moyen de 16,1%. Rien d’étonnant vu les avantages quasi-instantanés du cloud : accélération de l’innovation ; nouvelles voies d’accès rapide aux marchés ; meilleurs outils de conquête, de satisfaction et de fidélisation des clients... Autant d’ingrédients essentiels pour assurer la pérennité de n’importe quelle activité. Dans ce contexte d’adoption effrénée du cloud computing, les professionnels de la cybersécurité n’ont pas tardé à manifester leurs inquiétudes. Lors d’un sondage réalisé en 2018, 90% d’entre eux se sont dits préoccupés par la sécurité du cloud, soit 11 points de plus que l’année précédente. Si l’inquiétude gagne le monde de la cybersécurité, qu’en est-il des Comex et des dirigeants d’entreprise ?

Guide

あらゆる場所を、より安全に

現在はクラウドが主流です。Gartner によると、クラウド市場全体の規模は、2018 年の1,824 億米ドルから2022 年には3,312 億米ドルまで成長する見込みで、年平均成長率(CAGR) は16.1% です。これは驚くことではありません。クラウドにより、急速なイノベーショ ン、従来よりも迅速な新しい販売ルート、顧客を獲得し、満足させ、維持するためのより良い新たな方法などのメリットをほぼ即座に享受することができるからです。これらはいかなる企業にとっても、存続し、成功するために重要な要素です。 2018年には、クラウド コンピューティングの導入が急速に進んだものの、サイバーセキュリティの専門家の間では懸念も増大しました。 サイバーセキュリティ専門家10人のうち9人は、「クラウドのセキュリティが心配だ」と回答し、前年の調査結果から11% 増となりまし た。もしサイバーセキュリティ専門家の間で懸念が高まっているのなら、それは経営幹部や他のビジネス リーダーにとってどのような意 味があるのでしょうか?

Datasheet

어디서나 더욱 안전한 환경

The journey to the cloud is not a linear one, and organizations choose to migrate to the cloud in a multitude of ways and approaches. The resulting complexity is the enemy of security. In fact, according to ESG, “36% of organizations use between 24 to 49 different security products while 19% use more than 50 different products from an assortment of vendors.” All this noise only makes way for more security concerns such as integration issues, misconfigurations, and access control. To overcome this complexity and succeed in the cloud, organizations must demand security solutions that can quickly and effectively scale with changing business needs. Prisma by Palo Alto Networks is the industry’s most complete cloud security offering for today and tomorrow, providing unprecedented visibility into data, assets, and risks across the cloud and delivered with radical simplicity.
Displaying 1 - 30 of 140