Key features, performance capacities and specifications for all Palo Alto Networks firewalls.

 

This specsheet is also available in:


 

Palo Alto Networks Support Services Datasheet

Overview of service and support options available to you.
  • 6
  • 16861

Actionable Threat Intelligence

This document explores and highlights the capabilities of Palo Alto Networks network security management solution, and its ability to make critical information visible and actionable.
  • 25
  • 13001

Security Lifecycle Review

Security Lifecycle Review
  • 2
  • 4651

Palo Alto Networks and Aruba Networks

Aruba Networks and Palo Alto Networks have partnered to provide best of class content security for guest and employee owned mobile devices that are now commonplace on enterprise networks. With the certified solution, enterprise IT departments can now securely enable Bring Your Own Device and Guest Access initiatives, while maintaining compliance. Aruba’s Wi-Fi network and Palo Alto Networks’ next-generation firewalls share user, device and application information to monitor and enforce application usage policies on smartphones, tablets and laptops.
  • 0
  • 5733

Application Usage and Threat Report

The AUTR provides visibility into the real-world threat and application landscape, helping security teams to understand how adversaries are attempting to attack organizations around the world and build proactive, actionable controls. Built by the Unit 42 threat research team, the report correlates data from more than 7,000 enterprise organizations, providing broad visibility into critical trends.
Santa Clara
  • 29
  • 8598

Credential-Based Attacks

Credential-Based Attacks: Exposing the Ecosystem and Motives Behind Credential Phishing, Theft and Abuse In this white paper, Unit 42 details the ecosystem behind how adversaries steal and leverage legitimate credentials to break in and move laterally within the organization, often bypassing security controls. Learn the key attack methods currently in use, how this technique fits into attacker playbooks, and real-world guidance on preventing successful attacks.
Santa Clara
  • 0
  • 2440