Displaying 31 - 60 of 76
Other
PALO ALTO NETWORKS AND SCITUM TELMEX Managed Detection and Response (MDR)
With more than 22 years in the market, Scitum TELMEX is the leader in cybersecurity in Latin America.
Whitepaper
Cybersecurity reference blueprint for manufacturing
Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
Whitepaper
Remote Access for ICS and SCADA PDF
White paper discussing how remote access can be supplied to both greenfield or brownfield deployments into an automation network.
Article
Security Reference Blueprint for Industrial Control Systems White Paper
The Security Reference Blueprint for Industrial Control and SCADA Systems provides an IT-OT security framework in which owners and operators can protect these critical systems from compromise, rationalize the scope of compliance and more, using the core capabilities of Palo Alto Networks® Security Operating Platform.
Whitepaper
Applying VLAN Insertion in ICS/SCADA
Network segmentation is a critical, fundamental building block in today’s modern process controls networks (PCN). Once thought to be an optional practice, the recent increase in attacks on ICS/SCADA systems shows it is vital to network design and security implementation. Case studies on both the Target® and the more recent Ukraine electrical grid attacks indicate that these attacks were containable – even preventable – had the proper network segmentation been in place.
Video
Multi-cloud security analytics
The acquisition of Prisma Public Cloud will add critical security analytics capabilities across multi-cloud environments to our extensive cloud security offering. The security analytics capability utilizes an innovative AI-driven approach that correlates disparate security data sets. Prisma Public Cloud provides comprehensive visibility, threat detection, and rapid response across an organization’s entire public cloud environment.
Whitepaper
Palo Alto Networks Prisma Access and Cradlepoint NetCloud Solution Brief
To learn more about the key benefits of implementing this integration and sample use cases, download the Palo Alto Networks Prisma Access and Cradlepoint NetCloud Solution Brief
Whitepaper
Platform Brief for Manufacturing
Manufacturers are employing the industrial internet of things and other innovative technologies to produce quality goods efficiently. Read this platform brief for a summary of how Palo Alto Networks helps manufacturers compete in the global marketplace while streamlining security operations, protecting valuable data, and preventing new and known threats from impacting operations or uptime of corporate and ICS/SCADA networks.
Whitepaper
Security Offerings: Buyer Beware
Cost is only one of many variables to consider when evaluating your security platform provider. Are you investing in the right security?
Whitepaper
21st Century SCADA Security with Mario Chiock (WP)
SCADA and Industrial Control Systems experience unprecedented levels of agility, speed, and cost savings with the adoption of information technology and increased connectivity to supporting networks.
However, with this modernization have also come undesired IT vulnerabilities and other threat vectors which are increasingly being exploited by malicious actors.
The need for improved security in ICS has never been higher and has become a board-level issue for many organizations.
In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.
Book
MNO’s Guide to Buying a 5G-Ready Next Generation Firewall
With industries moving toward automation and hyperscale, a wide range of use cases such as massive IoT, mission-critical IoT, smart cities, smart grids, and smart factories—to name a few—are on their way to coming into reality with 5G—the single most powerful enabler of ubiquitous connectivity between users, devices, machines, and systems. In the new era of 5G, mobile network operators have the opportunity to move up the value chain and capitalize on net-new opportunities of revenue generation. The market opportunity with 5G-enabled industry 4.0 innovation is massive. However, to live up to its potential, your mobile network requires a wide variety of advanced security safeguards to safely deliver 5G-powered applications and services. As you prepare for your network transition to 5G, look for six essential capabilities in your 5G-ready next-generation firewall.
Book
MNO's Guide to Buying a 5G-Ready Next Generation Firewall
Evolving network architectural changes vastly impact 5G security postures that mobile operators are required to adopt in their journey to 5G. As you prepare for your network transition to 5G, look for six essential capabilities in your 5G-ready next-generation firewall.
Infographic
Service Provider Threat Considerations
Five security considerations mobile network operators need to keep on top of mind for a holistic and transformative approach to security across their mobile network.
Whitepaper
Cyber Threat Report: Reconnaissance 2.0
Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
Whitepaper
Cyber Threat Report: Reconnaissance 2.0
Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
Whitepaper
Cyber Threat Report: Reconnaissance 2.0
Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
Video
Lightboard Series: DNS Security Service - Protecting against malware using DNS
Protecting against malware using DNS
Whitepaper
Stop Targeted Attacks Without Decrypting Traffic
Stop Targeted Attacks Without Decrypting Traffic
Other
Cybersecurity Business Value Calculator
With attacks happening at alarming rates, cybersecurity investments must be spent on the right tools and technologies. Are you getting the most out of your security investments?
Meta: With attacks happening at alarming rates, cybersecurity investments must be spent on the right tools and technologies. Are you getting the most out of your security investments?
Webinar
What’s Next for EDR? It’s Time to Rethink the “E” in EDR
Your security teams need visibility, but it shouldn’t come at a cost. Endpoint detection and response has long been positioned as the last line of defense against attacks, yet detection and response times continue to increase.
Webinar
Are your point of sale environments protected?
An often-forgotten area in the enterprise network which poses a significant risk to your organization if compromised are Building Management/Automation Systems (BMS/BAS).
Use Case
Use Case: Simplify Cybersecurity and Maintain Resilience in the Water Sector
Read this use case for real-world examples of how water districts and authorities reduce cybersecurity risk while securing new digital innovations.
Whitepaper
Cybersecurity for Oil and Gas Platform Brief
Overview of how oil and gas companies can secure network, endpoint, and cloud environments with the Security Operating Platform
Whitepaper
Cable MSO and Telco Use Case Handbook
Download now to learn more
Whitepaper
VM-Series On Google Cloud Deployment Guidelines
Organizations are adopting Google® Cloud Platform to take advantage of the same technologies that drive common Google services. Many business initiatives, such as big data, analytics and machine learning, deployed on GCP allow you to leverage contextual data collected from billions of search engine data points. The power behind GCP, combined with agility and a global footprint, help you quickly deploy enterprise-class applications and services.
Video
Remove IaaS and PaaS Cloud Risks
Infrastructure-as-a-service and platform-as-a-service offerings – IaaS and PaaS, respectively – are gaining traction for application development, analytics, business intelligence and more, but they also create new risks. Fragmented security, manual operations and human error can cause breaches as well as slow down application deployments.
Palo Alto Networks provides advanced protection for consistent security across all major clouds – Amazon® Web Services, Microsoft® Azure® and Google® Cloud Platform – and our automation features minimize the friction of app development and security. You can protect and segment applications, deliver continuous security and compliance, and achieve zero-day prevention.
Datasheet
Verizon Partner Profile
Choose Palo Alto Networks
With Your Next FlexWare Sale.
References and Case Studies
Telkom Indonesia
Telkom Indonesia chose Palo Alto Networks to strengthen the security operations center as the company prepares for global expansion.
References and Case Studies
Murrumbidgee Irrigation
The importance of protecting SCADA systems has never been greater than is the case today. With SCADA systems scattered
across its vast irrigation infrastructure, Murrumbidgee Irrigation lives this challenge every day. When security penetration testing pinpointed potential security deficiencies, Murrumbidgee Irrigation embarked on an initiative to transform its security network architecture.
After comparing different solutions and testing many of them, Murrumbidgee Irrigation chose Palo Alto Networks® Next-Generation Security Platform. In addition to providing
the company’s small ICT team with a single point of contact for multiple areas of its security environment, the platform enabled Murrumbidgee Irrigation to move from a largely reactive security posture to one that is predictive.
Research Reports
Credential-Based Attacks Research
Credential-Based Attacks: Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse
In this white paper, Unit 42 details the ecosystem behind how adversaries steal and leverage legitimate credentials to break in and move laterally within the organization, often bypassing security controls. Learn the key attack methods currently in use, how this technique fits into attacker playbooks, and real-world guidance on preventing successful attacks.
Santa Clara
Displaying 31 - 60 of 76