Palo Alto Networks® engaged TRUSTe®, an independent data privacy risk management provider, to review and document the data flows and practices described in this datasheet. The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.


 

Comparing Palo Alto Networks With Proxy-Based Products

Comparison of Palo Alto Networks next-generation firewall technology with proxies.
  • 1
  • 25743

Threat Prevention Datasheet

Threat Prevention protects your network against these threats by providing multiple layers of prevention, confronting threats at each phase of the attack.
  • 1
  • 21833

URL Filtering Datasheet

URL Filtering with PAN-DB enables safe web access, protecting users from dangerous websites, malware sites, credential-phishing pages and attacks.
  • 2
  • 15616

Evident for Public Cloud Infrastructure

Continuous Visibility and Enforcement for a Secure, Compliant Cloud
  • 0
  • 1502

Single-Pass Architecture

Outlines the benefits of intelligently integrating security functions into your firewall, why past approaches have failed, and how Palo Alto Networks succeeded with our single-pass architecture approach.
  • 6
  • 13585

At a Glance URL Filtering

Learn how the URL Filtering component of Palo Alto Networks Next-Generation Security Platform automatically protects you against phishing and malicious websites.
  • 2
  • 9069