See our SolarStorm response
  • Network Security
  • Cloud Security
  • Security Operations
  • More
  • Get support
  • Sign In
  • Get Started

Aaron's Case Study - Palo Alto Networks CloudGenix SD-WAN

Read this case study to see Aaron's move to the cloud with CloudGenix SD-WAN.
See more

Guide to Securing Microsoft Office 365 for the Enterprise

This paper describes how the Palo Alto Networks Security Operating platform secures your data in Microsoft Office 365 and other cloud applications.
See more
Displaying 31 - 59 of 59
  • 1
  • 2

White Paper

Cybersecurity for Retail Platform Brief

In a competitive and rapidly changing industry that’s continually targeted by cyberthreats, creating a secure digital foundation is critical to success. Read this platform brief for a concise summary of how Palo Alto Networks helps retailers secure customer data while thwarting cyberattacks, streamlining security operations, and granting appropriate network access to employees, customers, suppliers and partners.
June 6, 2018

White Paper

Guide to Securing Microsoft Office 365 for the Enterprise

This paper describes how the Palo Alto Networks Security Operating platform secures your data in Microsoft Office 365 and other cloud applications.
June 5, 2018

References and Case Studies

株式会社東急ハンズ

出口対策に有効な仮想化次世代ファイアウォールを導入 東急ハンズは2017年10月、内部ネットワークとインターネットのゲートウェイに設置するセキュリティ対策機能として、パロアルトネットワークスの仮想化次世代ファイアウォール「VM-Series」を導入、運用を開始した。アマゾン ウェブ サービス(AWS)による“100%クラウド" を推進する同社では、セキュリティ強化の一環として標的型サイバー攻撃の出口対策に有効なアプリケーションの可視化・制御を行うソリューションの導入を検討。日本のAWSユーザーが集まる「JAWS-UG(AWS Users Group-Japan)」での評価も参考にしながら機能・性能を比較した結果、VM-Seriesを選定したという。
May 23, 2018

White Paper

How to Secure Your Business in a Multi-Cloud World

This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments.
May 15, 2018

White Paper

USE CASE: Grow and Maintain Cyber Skills With a Cyber Range

Repurpose existing talent, grow, test and maintain cyber skills with a Cyber Range using Palo Alto Networks Next Generation Security platform for your Blue team.
April 10, 2018

References and Case Studies

SkiStar AB

Scandinavian Resort Giant Delivers Secure Network Experience for Guests Online and on the Ski Slopes
March 7, 2018

Article

Flexware Devices

Virtualized industry standard network hardware means deployment speed and flexibility. You can deploy, configure, and change FlexWare Applications at your sites quickly and often without hardware changes.
December 26, 2017

Blogs

2018 Predictions & Recommendations: What Retailers Should be Thinking About and Planning for

Cybersecurity predictions and recommendations: what retailers should be thinking about and planning for in 2018.
Christopher Budd, December 19, 2017

Unit 42

Threat Brief: Unauthorized Coin Mining – A New Threat Facing Shoppers and Retailers This Holiday Season

Threat Brief: unauthorized coin mining – a new threat facing shoppers and retailers this holiday season.
Unit 42, December 6, 2017

Article

State of the Cybersecurity Nation: Legislation and Europe’s Security Professionals

With both the threat landscape evolving rapidly and regulatory requirements becoming more demanding, organisations are struggling to prepare for cybersecurity incidents. .
November 8, 2017

Blogs

Channel Scoop – September 1, 2017

Sit back and relax while we bring you this week’s Channel Scoop.
Lang Tibbils, September 1, 2017

Blogs

Now Available: Security Reference Blueprint for Retail

Now available: security reference blueprint for retail.
Anna Lough, August 30, 2017

White Paper

Secure the Network through Application Visibility PDF

Governments and businesses must continuously assess the use of new applications and services that improve processes and operations. As such, they must weigh the business benefits from the adoption of newly sanctioned applications against potential risk to the business, its data and other resources. Applications themselves, such as remote access, can represent undue risk. In addition, if applications are not appropriately secured in the business network, today’s attackers can hide communications within the very communication mechanisms the applications use. Adoption of security that appropriately identifies, granularly controls and secures enterprise applications can be slow if those charged with such controls don’t understand the necessity, value or ease with which appropriate controls can be adopted. Download our use case "Secure the Network through Application Visibility" for the benefits of this approach, along with some common concerns over adoption, and read about the experiences of several customers across different industries who made this transition.
July 18, 2017

White Paper

Security Reference Blueprint for Retail

This white paper outlines key security principles for modern retail networks and a framework that reduces operational demands on IT and security teams while improving security and control.
July 5, 2017

White Paper

Simplify PCI Compliance with Network Segmentation PDF

Establishing, maintaining and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for all entities involved in payment card processing – including merchants, processors, acquirers, issuers, and service providers, as well as all other entities that store, process or transmit cardholder data (CHD) and/or sensitive authentication data (SAD). For all system components included in or connected to the Cardholder Data Environment (CDE), organizations must comply with more than three hundred requirements. It is in every organization’s best interest, therefore, to take advantage of network segmentation provisions stated in the PCI DSS to effectively isolate their CDE and thereby decrease the amount of infrastructure that is considered in scope. Download our use case "Simplify PCI Compliance With Network Segmentation" to learn how Palo Alto Networks Next-Generation Security Platform delivers maximum protection for an organization’s entire computing environment while greatly reducing the scope of PCI compliance.
June 20, 2017

White Paper

Campus in the Cloud

Campuses – including branch offices, retail stores, temporary office space, or events venues – require secure WAN/LAN connectivity and shared services such as authentication, print, Wi-Fi, telephony, etc., to be implemented. The main challenges encountered during the technology deployment of campuses include: Wide adoption of cloud-based apps demands better application performance for branch offices. The continued use of multi-protocol label switching (MPLS)/backhaul traffic results in scalability issues and cost overruns. The deployment of WAN/security/shared services to branch offices is slow and expensive to maintain.
April 28, 2017

Blogs

Customer Spotlight: Delta Holding Prevents Ransomware by Upgrading Security Posture

Delta Holding is a Belgrade-based organization made up of three distinct companies running autonomously while under central direction from the holding company. As one of the largest businesses in Serbia, Delta Holding’s …
Leiann Bonnet, October 20, 2016

Blogs

Customer Spotlight: Warren Rogers Achieves PCI Compliance in its Cloud-based Data Center

Warren Rogers Associates (Warren Rogers) specializes in statistical analyses and advanced system diagnostics for the retail petroleum industry. As an industry leader in retail fuel monitoring and diagnostics, Warren Rogers manages thousands …
Rae Harrison, June 16, 2016

References and Case Studies

SunRice

SunRice was formed in 1950 when ricegrowers pooled their funds to establisha co-operative and built a rice mill inLeeton, a small town in New SouthWales, Australia. Today, the company hasgrown to become a $1 billion global foodbusiness supplying diverse and nutritiousfood products to more than 60 countries,including across Asia, the Pacific, MiddleEast and the United States. SunRiceemploys more than two thousand peopleacross its global operations and is widelyconsidered to be an Australian icon.SunRice is the quintessential “local kidmakes good” story. Officially knownas Ricegrowers Limited, SunRice hasblossomed into one of the world’s largestrice food companies while retaining itsroots in the Australian farming regionwhere it was founded in 1950.
February 8, 2016

Blogs

Customer Spotlight: UNIVEG Trade Italy Freshens Up Network Security

UNIVEG Trade Italy exports fresh fruits, vegetables, and overseas products across northern Europe and the Mediterranean. If you’ve enjoyed fresh produce in the region, it was most likely courtesy of UNIVEG Trade …
Leiann Bonnet, December 8, 2015

Unit 42

Understanding and Preventing Point of Sale Attacks

In recent years, there have been a number of high-profile stories involving the compromise of point of sale (PoS) devices. My research often involves deep reverse engineering and analysis of various malware families targeting PoS devices. As such, I’m often asked about the overall threats that these machines face. In this article I hope to...
Josh Grunzweig, October 28, 2015

References and Case Studies

UNIVEG Trade Italy

UNIVEG Trade Italy exports fresh fruits and vegetables to Northern Europe for the UNIVEG Group, a worldwide distributor of fresh produce, specializing in fruits and vegetables, flowers and plants, and convenience products. Founded in 1969 and based near Verona, UNIVEG Trade Italy also imports overseas products and handles their sales throughout the Mediterranean, leveraging UNIVEG’s global transportation and logistics network for import and export activities.
October 14, 2015

Blogs

Securing the Checkout Line

Having recently moved to the San Francisco Bay Area, the reality that there is literally an app for everything is just now beginning to sink in. From my phone, office, and (the …
Davis Hake, August 6, 2015

Blogs

Customer Spotlight: How Columbia Sportswear Scales the Security Landscape

Columbia Sportswear has roughly 200 offices and retail stores globally, and supports approximately 5,000 users 24/7, so it requires a solution that is solid, supportable and easy to work with, which is …
Rae Harrison, June 26, 2015

Unit 42

FindPOS: New POS Malware Family Discovered

Unit 42 has discovered a new Point of Sale (POS) malware family, which includes multiple variants created as early as November 2014. Over the past few weeks we have been analyzing this malware family, which we have dubbed ‘FindPOS’ due to strings consistently found in each variant. While this malware doesn’t show strong sophistication, the...
Josh Grunzweig, March 19, 2015

Blogs

Join Us On LinkedIn for the Latest on Retail and Healthcare Security

Follow our new LinkedIn Showcase pages to find the latest in industry-specific resources, news, and events – from Palo Alto Networks and from influential voices in retail/POS and healthcare.
February 11, 2015

Blogs

Protect Your Retail Operations from Cyber Attacks: Why, What, and How

If you are responsible for security, cyber incident response, network operations, network architecture, information security, or compliance in general for a retailer, join us this Wednesday, January 28 for an interactive online event …
January 25, 2015

Blogs

A Customer Perspective: VMware NSX, Next-Generation Security and Micro-Segmentation

VMware NSX and Palo Alto Networks are transforming the datacenter by combining the fast provisioning of network and security services with next-generation security protection for East-West traffic. At VMworld, John Spiegel, Global …
Rae Harrison, August 13, 2014

Blogs

Better POS Security With Network Segmentation and a Zero Trust Approach

Following the much-discussed credit card breach at Target during the 2013 holiday season, CERT issued an alert on January 2, 2014 warning against malware specifically targeting Point of Sale (POS) systems. Because they …
January 8, 2014
Displaying 31 - 59 of 59
  • 1
  • 2

Be the first to know.

As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
Subscription Reward

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube
Create an account or login

© 2021 Palo Alto Networks, Inc. All rights reserved.