Palo Alto Networks® engaged TRUSTe®, an independent data privacy risk management provider, to review and document the data flows and practices described in this datasheet. The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.


 

Comparing Palo Alto Networks With Proxy-Based Products

Comparison of Palo Alto Networks next-generation firewall technology with proxies.
  • 1
  • 24111

Threat Prevention Datasheet

Threat Prevention protects your network against these threats by providing multiple layers of prevention, confronting threats at each phase of the attack.
  • 1
  • 20217

URL Filtering Datasheet

URL Filtering with PAN-DB enables safe web access, protecting users from dangerous websites, malware sites, credential-phishing pages and attacks.
  • 2
  • 14690

Single-Pass Architecture

Outlines the benefits of intelligently integrating security functions into your firewall, why past approaches have failed, and how Palo Alto Networks succeeded with our single-pass architecture approach.
  • 5
  • 12968

At a Glance URL Filtering

Learn how the URL Filtering component of Palo Alto Networks Next-Generation Security Platform automatically protects you against phishing and malicious websites.
  • 2
  • 8545

Evident for Public Cloud Infrastructure

Continuous Visibility and Enforcement for a Secure, Compliant Cloud
  • 0
  • 658