Displaying 1 - 30 of 77
Datasheet
Secure Your Sensitive Cloud Data
Secure your high tech org’s customer data with DSPM. Explore key benefits, ensure compliance, and protect cloud data from breaches in our comprehensive datasheet.
References and Case Studies
AI-Driven SOC Transformation with Cortex XSIAM
Explore how six organizations across various industries enhanced their security posture and transformed their security operations centers (SOC) with the AI technology in Cortex XSIAM®. Each case study delves into unique challenges and solutions showcasing the diverse application of Cortex XSIAM.
References and Case Studies
Defense contractor contains APT with Unit 42 Incident Response expertise
A nation-state associated with the TiltedTemple campaign used sophisticated tactics to breach a defense contractor. Learn how the Unit 42 IR team investigated and remediated the incident.
References and Case Studies
Palo Alto Networks Global Help Desk increases staff productivity and enhances user experience with AI-Powered ADEM
Autonomous Digital Experience Management integrates with Zoom Quality of Service Subscription to identify and troubleshoot the root cause of connectivity issues in minutes.
References and Case Studies
Quantiphi stays ahead with proactive vulnerability management and resolution of misconfigurations
Comprehensive cloud security, visibility, compliance coverage, and proactive vulnerability management with Prisma® Cloud
References and Case Studies
Next-Generation Firewalls enable unified security control and enhanced visibility at Movate
NGFW, Panorama, and Cortex XDR from Palo Alto Networks ensure a more proactive approach to cybersecurity.
Article
5Gセキュリティとは
5Gは、洗練されたモバイル ブロードバンド体験の提供と、企業や業界における大規模なデジタル化の実現により、モビリティに変革をもたらします。
Whitepaper
Stop Attackers from Using DNS Against You
Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is a protocol that translates user-friendly domain names, such as www.paloaltonetworks.com, into machine usable IP addresses—in this case, 199.167.52.137. Without DNS, we’d have to memorize random strings of numbers, which our brains aren’t well equipped to do. DNS is fundamental to every single modern organization, all over the world. Network operators cannot block DNS traffic, and firewalls have to let it through. Networks need DNS to function properly.
References and Case Studies
Digital Native Company Skedulo Integrates Comprehensive Cloud Security to Gain Business Value
Prisma Cloud addresses vulnerabilities quicker, prioritises risk, and eliminates blind spots across the application lifecycle.
Other
APP-IDs for ICS and SCADA
This document is a listing of application identifiers or App-IDs, supported by App-ID™ technology on Palo Alto Networks ML-Powered Next-Generation Firewalls for applications and protocols used to support operational technology (OT) industrial control systems (ICS).
References and Case Studies
Inspira’s Cyber Fusion Centers automate incident response with Cortex XSOAR
Optimized frameworks result in automation, orchestration, and faster response time for incident management, benefitting end customers.
Book
Reifegrad der cloudnativen Sicherheit: Turbo für eine effizientere Softwareentwicklung
Erfahren Sie, wie führende EntscheidungsträgerInnen ihre Anwendungen und deren Plattformen schützen, welche Tools sie nutzen, wie sie Systeme und Prozesse optimieren und auf ihren Betrieb abstimmen und wie sie Sicherheitskontrollen effektiv einsetzen.
Book
雲端原生安全成熟度:透過安全方式提升軟體開發效率
Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls.
Book
Maturité de la sécurité cloud-native : levier d’efficacité du développement logiciel
Sécurisation des applications et des plateformes sous-jacentes, choix des outils, perfectionnement des systèmes et processus à des fins d’alignement organisationnel, utilisation des contrôles... des décideurs vous révèlent leurs méthodes.
Book
クラウドネイティブ セキュリティ成熟度: セキュリティを通じたソフトウェア開発の効率化
Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls.
Book
클라우드 네이티브 보안 완성도: 보안을 적용하여 소프트웨어 개발 효율성 향상
Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls.
Book
Madurez de la seguridad nativa en la nube: Cómo usar la seguridad para impulsar la eficiencia en el desarrollo de software
Conozca los medios con que los altos cargos protegen sus aplicaciones y plataformas subyacentes, qué herramientas utilizan, cómo afinan los sistemas y procesos a nivel organizativo y de qué formas aprovechan los controles.
Book
云原生安全成熟度:以安全方式提高软件开发效率
Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls.
Book
Cloud Native Security Maturity: Using Security to Drive Software
Learn how senior decision makers secure their applications and underlying platforms, what tools they use, how they finesse systems and processes into organizational alignment and ways they leverage controls.
Find out why security program maturity correlates to operational excellence and enables more functionality and on-time product delivery.
Leverage the insights of a thousand seasoned security professionals. Access key benchmarks of the development processes toward a mature security program in this actionable e-book.
Datasheet
5G-Native Security At a Glance
Learn how 5G-Native Security protects all facets of the 5G infrastructure, including the user communications, applications, and data of business-critical enterprises, governments, as well as consumers.
Whitepaper
Revolutionize NGFWs and CASB App-ID with Machine Learning
In this white paper we bring to you Palo Alto Networks’ point of view on why revolutionizing the Next-generation Firewall and CASB App-ID with machine learning is vital for SaaS Security.
Whitepaper
Building a Remote-Access Solution
With the VM-Series and GlobalProtect™ now available on AWS®, you can protect your mobile workforce and your network from Internet-borne threats while dramatically reducing administrative effort and associated costs with an appliance-based, mobile-security and remote-access solution.
Whitepaper
Global and Regional WildFire Clouds
Regional WildFire clouds enable customers to fully utilize the industry’s most advanced cloud-based threat analysis and prevention engine while ensuring that files submitted for analysis stay in the defined region to address data privacy and sovereignty concerns.
Infographic
XDR: A New Approach to Detection and Response
Enterprises rely on Endpoint Detection and Response (EDR) as a means to respond to cybersecurity incidents. As cybercriminals and their tactics have become more sophisticated, the time to identify and time to contain breaches has only increased. It is becoming increasingly apparent that EDR has failed, and that we need a new approach to detection and response. XDR allows you to rapidly detect and respond to threats across your enterprise, spanning your network, cloud and endpoints.
Use Case
Advanced Endpoint Protection for Manufacturing
How Traps protect healthcare endpoints today and its business, operational and security benefits are explained.
Video
QlikTech Secures Container Development with AWS and Prisma Cloud
To secure its container-based AWS workloads, Qlik relies on Prisma Cloud to provide the runtime protection and static container scanning that is required to protect customers’ data.
Whitepaper
ICS/SCADA INDUSTRY Solutions Brief
Get an overview of how Palo Alto Networks security platform can help protect your critical assets and enable a least privilege access control model in your control networks.
Whitepaper
Security Reference Blueprint for Mining Industrial Control Systems
How to build security into your ICS and SCADA networks
Whitepaper
Palo Alto Networks and Orange Cyberdefense Managed Detection and Response (MDR)
Orange Cyberdefense provides a holistic solution to threat management to address all your security needs: prevent, automatically detect, investigate, respond and adapt.
Whitepaper
PALO ALTO NETWORKS AND NIL Managed Detection and Response (MDR)
To provide organizations with detection and response capabilities, NIL operates the NIL SOC, a managed detection and response (MDR) service.
Displaying 1 - 30 of 77