In this session Palo Alto Networks Consulting Engineer Jack Parks will walk you through the two primary ways to protect workloads in a vSphere environment using VM-Series virtual NGFWs to enforce L3 and L2 segmentation.
In this session we will walk you through how VM-Series virtual next-generation firewalls from Palo Alto Networks augment network security in NSX environments to deliver Zero Trust.
In this webinar, Google and Palo Alto Networks both discuss the benefits of using VM-Series virtual firewalls on Google Cloud Platform. You’ll hear details on integration points, recommendations for architectural design patterns, various use cases, and see a demo of one of these use cases.
To ensure business success, information security teams have to put automation and operational simplification into practice and fully leverage their benefits. This eBook provides the latest best practices and approaches to security to help you better protect your data and applications in the on-prem data center and across multi-cloud environments.
This guide outlines the challenges Defense agencies face and methods they can use to integrate the Palo Alto Networks ecosystem into the Federal Enterprise Architecture (FEA) to fight modern threats, meet current and future security objectives, and improve cyber resilience and operations.
Data centers are evolving to enable the ever increasing agility of application development. We surveyed 170 of our enterprise customers to find out how they're transforming their data centers to support today's dynamic application workloads, the technologies they're adopting and what challenges to watch out for.
Christer Swartz explains how Palo Alto Networks Next-Generation Firewalls integration with Cisco ACI® enables you to apply a uniform security policy and posture across your physical and virtualized firewalls.
The Security Reference Blueprint for Federal Civilian Departments and Agencies helps the U.S. deliver on its mission and business objectives to safely and securely render services to the American public, while advancing the Nation's agenda.
Watch this webinar for an in depth overview of how Prisma Access delivers protection from over 100 locations around the world from a cloud-native infrastructure that dramatically simplifies cloud access and networking – without compromising on security or performance.
Based on Palo Alto Networks customer date, this infographic provides an assessment of SaaS application usage and associated risks. Understand which SaaS applications are most widely used in the enterprise (e.g. Office365) as well as specific SaaS apps and file types that are known to deliver malware and other risks.
The growth in SSL/TLS encrypted traffic traversing the internet is on an explosive upturn. Given the primary benefits associated with encryption, the private and secure exchange of information over the internet, compliance with certain privacy and security regulations – such as the Health Insurance Portability and Accountability Act and Payment Card Industry Data Security Standard, or HIPAA and PCI DSS – the trend in SSL adoption is expected to continue to rise.
Organizations struggle to identify and prevent evasive threats. Here are three key challenges businesses and security tools face when combating evasive threats.
Private cloud computing provides businesses with flexible, scalable, on-demand IT resources. However, security remains a significant challenge. The very principles that make cloud computing attractive run counter to cybersecurity best practices, such as separation and segmentation. Malicious actors seek these open environments where much of the lucrative data they desire can be found, and if a virtual environment, without proper security and segmentation in place, is compromised, the attacker has access to everything – critical data included.
Download the Network Segmentation use case to see how the Palo Alto Networks Next-Generation Security Platform applies segmentation to increase security and protect applications and data in a virtualized data center.
While organizations have gained operational flexibility and lowered data center costs by deploying virtualization solutions, the true promise of a secure, agile, extensible, and flexible private cloud continues to be elusive. One of the key barriers is the ability to deploy security services at the same pace as virtual machine deployments without compromising the level of protection needed. VMware and Palo Alto Networks have partnered to address these challenges.
This brief discusses the top three considerations for securing traditional and cloud-based data centers, as well as key requirements for cloud security.
As your organization evolves from traditional datacenters to virtualized and cloud environments, your security architectures must evolve to support your changing set of requirements. This white paper describes the challenges of virtualized datacenter and cloud computing environments, and how to address them with next-generation firewalls.
To realize the benefits of virtualization you must adapt your security architecture to address new challenges, and today's application and threat landscape. 2nd Edition.
This paper examines modern endpoint protection, describing how the evolution of malware has created a need for a modernized approach to endpoint protection. It also looks at the role of Palo Alto Networks Traps offering in this critical market.
The Forrester Zero Trust Model (Zero Trust) of information security advocates a “never trust, always verify” philosophy in protecting information resources. Though the model has traditionally been applied to network communications, it is clear that today’s cyber threats warrant a new approach in which the Zero Trust model is extended to endpoints.
This white paper outlines how Palo Alto Networks® Traps™ Advanced Endpoint Protection is an innovative technology that extends the Zero Trust methodology to your endpoint security.