Date

By Type

By Industry

By Product Category

By Features

By Technology

By Services

By Audience

By Language

Displaying 1 to 30 of 108

Key Specifications for Palo Alto Networks Interfaces and Transceivers

The data interfaces implemented by Palo Alto Networks® are based on industry standards and implementation agreements primarily authored by the Institute of Electrical and Electronics Engineers (IEEE) 802.3 committee and the Small Form Factor (SFF) Committee. Each interface definition is supported by specifications and agreements defining the electromechanical coupling, electrical and optical signals, as well as management properties of compliant implementations.
  • 0
  • 118

Focused Services

Focused Services provides personalized support through a designated customer advocate. With this level of service, you’re assigned a services account manager who will provide tailored support, including weekly reviews, root cause analysis for critical issues, release review and upgrade planning, and a quarterly business review.
  • 0
  • 3028

Focused Services - Plus

Focused Services – Plus provides advanced customer care with direct access to a designated engineer for priority case handling, paired with deep technical expertise to accelerate incident resolution. Our experts will develop a tailored release strategy for you as well as conduct a yearly Threat Assessment Service that will validate the effectiveness of your controls.
  • 0
  • 3000

Focused Services - Elite

Focused Services – Elite provides the highest level of support services around the clock. A team of designated engineers is available 24/7 to resolve technical issues or support pre-scheduled events. This level of service also includes on-site troubleshooting assistance and two Threat Assessment Services per year. Focused Services – Elite helps you stay continuously ahead of threats with the experts you need, when you need them.
  • 0
  • 3000

Focused Services Overview

Learn more about a personalized support experience with Focused Services from Palo Alto Networks.
  • 0
  • 3140

Palo Alto Networks Support Services Datasheet

Overview of service and support options available to you.
  • 7
  • 19057

Custom-Built Firewall for Education

The Custom-Built Firewall for Education is a software-based Palo Alto Networks® Next-Generation Firewall that combines flexibility and value for educational establishments.
  • 0
  • 3032

Security Lifecycle Review Privacy

The purpose of this document is to help Palo Alto Networks® customers assess the impact of the Security Lifecycle Review (SLR) app on their overall privacy posture.
  • 0
  • 3206

Prevention-based Architecture Transformation Checklist

prevention-based architecture, transformation, professional services
  • 0
  • 3180

Traps Enterprise ELA

Understand how an enterprise license agreement (ELA) help to simplify endpoint protection purchasing and deployment.
  • 1
  • 3102

Firewall Feature Overview Datasheet

Firewall Feature Overview Datasheet
  • 22
  • 86202

Traps EMS to TMS Migration Service

Palo Alto Networks offers professional services to help you transition from your existing Traps Endpoint Security Management (ESM) implementation over to cloud-based Traps Management Service (TMS).
  • 0
  • 192

Panorama Datasheet 

Security deployments are complex and can overload IT teams with complex security rules and mountains of data from multiple sources. Panorama™ network security management empowers you with easy-to-implement, consolidated policy creation and centralized management features. Set up and control firewalls centrally with industry-leading functionality and an efficient rule base, and gain insight into network-wide traffic and threats.
  • 3
  • 15099

VM-Series for Google Cloud

Big data and context-rich application initiatives on Google® Cloud Platform are transforming data centers into hybrid clouds, yet the risks of data loss and business disruption remain. Embedding the VM-Series into your Google Cloud Platform application development lifecycle prevents data loss and business disruption, allowing your adoption to move at the speed of the cloud.
  • 1
  • 684

Prevention-Based Architecture Transformation Services

Palo Alto Networks® Transformation Services include the tools, best practices and assistance you need to effectively protect your organization against successful cyberattacks. We help you define and implement a security strategy that uses automation and a Zero Trust approach to simplify operations.
  • 0
  • 332

Logging Service Data Sheet

Network security log analysis is an important cybersecurity practice organizations perform to correlate potential threats and prevent successful cyber breaches. Managing logs from various security services, such as next-generation firewalls and cloud services, takes effort and resources. Palo Alto Networks® Logging Service introduces a simpler approach, managing valuable security logs while enabling innovative security applications in concert with Palo Alto Networks Application Framework.
  • 3
  • 4435

VM-SERIES in AWS for automotive enterprise and connected vehicles

Get more information for securely enablin the cloud https://www.paloaltonetworks.com/cyberpedia/cloud-security
  • 0
  • 3150

Logging Service Privacy Datasheet

Logging Service Privacy Datasheet
  • 1
  • 3419

Securing SSL in Education Datasheet

Selectively decrypt TLS/SSL traffic to maintain network security and stop malware
  • 0
  • 3167

Magnifier Privacy Datasheet

Palo Alto Networks® engaged independent data privacy risk management provider TrustArc® to review and document the data flows and practices described in this datasheet. The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.
  • 0
  • 3658

VM-Series Specsheet

To help customers address the diverse cloud and virtualization use cases and the growing need for greater performance, the VM-Series has been optimized and expanded to deliver industry-leading performance of up to 16Gbps of App-ID enabled firewall throughput across five models. Customers can protect their cloud and virtualization initiatives with a security feature set that mirrors those protecting their physical networks and delivers a consistent security posture from the network to the cloud.
  • 7
  • 55966

Traps Management Service Privacy Datasheet

Traps Management Service Privacy Datasheet
  • 0
  • 6859

Resident Engineer

Resident Engineer
  • 3
  • 3454

Mobile Network Infrastructure Security

Download the data sheet for more details on protection for roaming, RAN, and Internet interfaces.
  • 0
  • 163

What Is the EU NIS Directive?

This paper provides an overview of the security and incident notification obligations of the EU NIS Directive and outlines how a Security Operating Platform can help.
  • 0
  • 258

App-ID for ICS/SCADA Tech BriefUpdated 5/23/18

Learn about our existing application identifiers for ICS & SCADA networks, how you can develop your own using custom App-ID decoders, and how you can submit a request for new App-IDs.
  • 2
  • 1663

AutoFocus Datasheet

Palo Alto Networks AutoFocus™ threat intelligence service re-imagines how security teams protect their organizations from unique, targeted attacks. The hosted security service provides the intelligence, analytics, and context required to understand which attacks require immediate response, as well as the ability to make indicators actionable and prevent future attacks. Read the data sheet to learn the key benefits of the AutoFocus service.
Palo Alto Networks,
  • 2
  • 13903

Evident At A Glance

Palo Alto Networks® Evident provides continuous security of public cloud infrastructure services, enabling you to deploy applications confidently, knowing the cloud is configured according to your organization’s security requirements.
  • 0
  • 1989

Expedition Transformation & Best Practices Adoption Tool

The Expedition Transformation and Best Practices Adoption Tool helps to improve your security posture by comparing your device and policy configurations against Palo Alto Networks best practices, and then automatically identifying and providing remediation recommendations.
  • 4
  • 5728

Cybersecurity Academy Curriculum

The Palo Alto Networks Cybersecurity Academy is a university program to help educate the next generation of cybersecurity experts. This document is a list of the curriculum associated with the program.
  • 2
  • 1106
Displaying 1 to 30 of 108