Date

By Type

By Industry

By Product Category

By Features

By Technology

By Services

By Audience

By Language

Displaying 1 to 30 of 116

Global Protect Cloud Service Data Sheet

Global expansion, mobile workforces and cloud computing are shifting the locations of your applications, data and users. These changes introduce new opportunities for business efficiencies, but they also create a set of unique cybersecurity challenges.
  • 2
  • 7928

Aperture at a Glance

Aperture delivers complete visibility and granular enforcement across all user, folder and file activity within sanctioned SaaS applications.
  • 7
  • 17192

Dedicated Architect Data Sheet

Global expansion, mobile workforces and cloud computing are shifting the locations of your applications, data and users. These changes introduce new opportunities for business efficiencies, but they also create a set of unique cybersecurity challenges.
  • 0
  • 12

Directory Sync Privacy Data Sheet

Document describing how Directory Sync collects and processes data
  • 0
  • 16

Security Operations Assessment Service

Palo Alto Networks Security Operations Assessment Service improves your confidence in your SOC by identifying gaps within your operations; providing clear recommendations to strengthen operations, increase automation, and improve response times.
  • 1
  • 2173

APP-ID s FOR ICS AND SCADA

Learn about our existing application identifiers for ICS & SCADA networks, how you can develop your own using custom App-ID decoders, and how you can submit a request for new App-IDs.
  • 2
  • 1820

Cybersecurity Academy Curriculum

The Palo Alto Networks Cybersecurity Academy is a university program to help educate the next generation of cybersecurity experts. This document is a list of the curriculum associated with the program.
  • 3
  • 1622

WildFire Datasheet

WildFire Datasheet
  • 8
  • 29704

Secure Microsoft Azure with RedLock

RedLock for Azure dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.
  • 0
  • 6428

Secure Amazon Web Services with RedLock

RedLock for AWS dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.
  • 0
  • 6443

Professional Services Traps Implementation

The cyberthreat landscape continues to evolve rapidly and is becoming increasingly complex as new technologies emerge. Ensuring your organization is properly protected on the endpoint requires not only the most capable security products but also the most capable people. With this in mind, we have developed a dedicated team of highly skilled experts to provide you with the best possible services to protect your endpoints.
Santa Clara, CA
  • 0
  • 15544

Secure Google Cloud with RedLock

RedLock for Google Cloud dynamically discovers cloud resource changes and continuously correlates raw, siloed data sources including user activity, resource configurations, network traffic, threat intelligence, and vulnerability feeds to provide a complete view of public cloud risk.
  • 1
  • 142

Threat Assessment Service

Personalized traffic analysis with evidence based recommendations provided via the Threat Assessment Service for NGFW.
  • 0
  • 0

Confidently Accelerate Your Adoption of Google Cloud

With a shared belief that security is a driver of cloud adoption, Palo Alto Networks and Google Cloud have partnered to help organizations extend enterprise security everywhere. This initiative combines infrastructure security from Google with dedicated protection from Palo Alto Networks to secure your apps and data located in hybrid environments, G Suite™ and Google Cloud Platform, aka GCP™.
  • 0
  • 193

Telemetry Privacy

Description of data collection and data processing by our Telemetry feature
  • 0
  • 79

Prevention-Based Architecture Transformation Services

Palo Alto Networks® Transformation Services include the tools, best practices and assistance you need to effectively protect your organization against successful cyberattacks. We help you define and implement a security strategy that uses automation and a Zero Trust approach to simplify operations.
  • 0
  • 458

RedLock At a Glance

With RedLock by Palo Alto Networks®, organizations can maintain compliance, govern security, and enable security operations across public cloud computing environments.
  • 1
  • 7013

Key Specifications for Palo Alto Networks Interfaces and Transceivers

The data interfaces implemented by Palo Alto Networks® are based on industry standards and implementation agreements primarily authored by the Institute of Electrical and Electronics Engineers (IEEE) 802.3 committee and the Small Form Factor (SFF) Committee. Each interface definition is supported by specifications and agreements defining the electromechanical coupling, electrical and optical signals, as well as management properties of compliant implementations.
  • 0
  • 700

Focused Services

Focused Services provides personalized support through a designated customer advocate. With this level of service, you’re assigned a services account manager who will provide tailored support, including weekly reviews, root cause analysis for critical issues, release review and upgrade planning, and a quarterly business review.
  • 0
  • 3028

Focused Services - Plus

Focused Services – Plus provides advanced customer care with direct access to a designated engineer for priority case handling, paired with deep technical expertise to accelerate incident resolution. Our experts will develop a tailored release strategy for you as well as conduct a yearly Threat Assessment Service that will validate the effectiveness of your controls.
  • 0
  • 3000

Focused Services - Elite

Focused Services – Elite provides the highest level of support services around the clock. A team of designated engineers is available 24/7 to resolve technical issues or support pre-scheduled events. This level of service also includes on-site troubleshooting assistance and two Threat Assessment Services per year. Focused Services – Elite helps you stay continuously ahead of threats with the experts you need, when you need them.
  • 0
  • 3000

Focused Services Overview

Learn more about a personalized support experience with Focused Services from Palo Alto Networks.
  • 0
  • 3305

Palo Alto Networks Support Services Datasheet

Overview of service and support options available to you.
  • 8
  • 19707

Security Lifecycle Review Privacy

The purpose of this document is to help Palo Alto Networks® customers assess the impact of the Security Lifecycle Review (SLR) app on their overall privacy posture.
  • 0
  • 3327

Traps Enterprise ELA

Understand how an enterprise license agreement (ELA) help to simplify endpoint protection purchasing and deployment.
  • 1
  • 3178

Prevention-based Architecture Transformation Checklist

prevention-based architecture, transformation, professional services
  • 0
  • 3498

Custom-Built Firewall for Education

The Custom-Built Firewall for Education is a software-based Palo Alto Networks® Next-Generation Firewall that combines flexibility and value for educational establishments.
  • 0
  • 3078

Firewall Feature Overview Datasheet

Firewall Feature Overview Datasheet
  • 22
  • 88017

Traps EMS to TMS Migration Service

Palo Alto Networks offers professional services to help you transition from your existing Traps Endpoint Security Management (ESM) implementation over to cloud-based Traps Management Service (TMS).
  • 2
  • 316

Panorama Datasheet 

Security deployments are complex and can overload IT teams with complex security rules and mountains of data from multiple sources. Panorama™ network security management empowers you with easy-to-implement, consolidated policy creation and centralized management features. Set up and control firewalls centrally with industry-leading functionality and an efficient rule base, and gain insight into network-wide traffic and threats.
  • 4
  • 17487
Displaying 1 to 30 of 116