Date

By Type

By Industry

By Product Category

By Features

By Technology

By Services

By Audience

By Language

Displaying 31 to 60 of 70

Traps: Advanced Endpoint Protection

Palo Alto Networks Advanced Endpoint Protection represents a complete paradigm shift from identification to pure prevention. Providing comprehensive exploit and malware prevention that is not designed to identify; instead, it prevents an attack before the malware can be successful.

Santa Clara, CA
  • 23
  • 52387

EU Data Protection Compliance When Securing SaaS Applications

The purpose of this white paper is to clarify how Networks Aperture™ SaaS security service can be used in compliance with EU data protection requirements, including the upcoming EU General Data Protection Regulation.

  • 0
  • 316

GlobalProtect Datasheet

GlobalProtect extends the protection of the Palo Alto Networks Next-Generation Security Platform to your mobile workforce, no matter where they may go.

  • 3
  • 40931

WildFire Appliance (WF-500)

The WildFire Appliance WF-500 automatically detects and prevents zero-day exploits and malware with on-premise analysis that meets privacy and regulatory requirements.

  • 1
  • 1514

USE CASE: On-Premise Unknown Threat Analysis for Financial Services

Advanced attacks have been able to evade traditional security measures, target specific users and vulnerable applications, steal sensitive information or commit outright fraud. One approach to preventing such advanced persistent threats (APTs) is to identify and protect against new exploits, malware and malicious URLs. This can be accomplished by “sandbox” analysis of unknown threats. Organizations such as financial institutions that are uncomfortable with cloud-based threat analysis may choose on-premise threat analysis solutions to address any data privacy concerns. Download this whitepaper to read about how Financial Services organizations can use on-premise threat analysis solutions to mitigate compliance risks and maximize prevention against cyberattacks.

  • 0
  • 143

Traps Privacy Datasheet

This document provides customers of Palo Alto Networks with information needed to assess the impact of Traps on their overall privacy posture.

  • 1
  • 932

Key Specifications for Palo Alto Networks Interfaces and Transceivers

The data interfaces implemented by Palo Alto Networks® are based on industry standards and implementation agreements primarily authored by the Institute of Electrical and Electronics Engineers (IEEE) 802.3 committee and the Small Form Factor (SFF) Committee. Each interface definition is supported by specifications and agreements defining the electromechanical coupling, electrical and optical signals, as well as management properties of compliant implementations.

  • 0
  • 657

Technical Account Management

The Palo Alto Networks Technical Account Management (TAM) program provides customers who require a more proactive level of support with a dedicated customer advocate.

  • 1
  • 2716

LightCyber Behavioral Analytics

LightCyber™ behavioral analytics enables organizations to stop active attackers and malware operating in the network. With LightCyber, attackers have nowhere to run and nowhere to hide. LightCyber learns expected user and device behavior and detects anomalous activity indicative of an attack. Its network-centric model catches attacks during every stage of the attack lifecycle, ensuring all threats are uncovered and eliminated. Download the datasheet to learn the key benefits of LightCyber behavioral analytics.

  • 0
  • 729

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.

  • 62
  • 181564

Palo Alto Networks Premium Plus Support

Premium Plus Support ensures your business continues to operate at peak performance and your business functions are kept secure and available.

  • 5
  • 6544

Expedited 4-Hour Global RMA Datasheet

Palo Alto Networks offers expedited RMA options with rapid hardware replacement to protect your security uptime. Upgrade to our 4-Hour Premium Support RMA.

  • 0
  • 201

Health Check and Configuration Audit

The Palo Alto Networks Certified Professional Services Program (CPSP) enables and promotes qualified partners who have demonstrated professional services capabilities and expertise.

Palo Alto Networks,
  • 1
  • 3422

Citrix NetScaler SDX

Now, with the addition of the VM-Series on Citrix NetScaler SDX, security and ADC services can be consolidated on a single hardware platform.

  • 2
  • 3300

Integrated URL Filtering Datasheet

URL Filtering with PAN-DB enables safe web access, protecting users from dangerous websites, malware sites, credential-phishing pages and attacks.

  • 1
  • 13055

PA-7000 Series Specsheet

Key features, performance capacities and specifications for our PA-7000 Series.

Palo Alto Networks, Santa Clara, CA
  • 13
  • 47370

AutoFocus Datasheet

Overview of the AutoFocus threat intelligence service.

Palo Alto Networks,
  • 1
  • 10450

Next-Generation Security Platform Datasheet

Palo Alto Networks Next-Generation Security Platform helps enterprises, service providers and governments with a prevention-first approach to cybersecurity.

  • 0
  • 2206

Threat Prevention Datasheet

Threat Prevention protects your network against these threats by providing multiple layers of prevention, confronting threats at each phase of the attack.

  • 0
  • 16856

Aperture Privacy Datasheet

This document provides customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture.

  • 1
  • 854

URL Filtering Privacy Datasheet

This document provides customers of Palo Alto Networks with information needed to assess the impact of the URL Filtering service on their overall privacy posture.

  • 1
  • 1647

AutoFocus Privacy Datasheet

This datasheet provides Palo Alto Networks customers using AutoFocus with information needed to assess the impact of this service on their overall privacy posture.

  • 1
  • 655

Traps Exploit Prevention Event Analysis E-Learning

This short standalone module summarizes how Traps customers can analyze security events resulting from Traps exploit prevention.

  • 1
  • 224

Cloud Security Service Provider Licensing Datasheet

Cloud IT services and security outsourcing are becoming popular with enterprises and SMBs, fueling demand for Security as a Service (SecaaS).

  • 1
  • 1622

AutoFocus At A Glance

The AutoFocus threat intelligence service allows security teams to prioritize their response to unique, targeted attacks. Gain the intelligence, analytics, and context needed to protect your organization. View the At-a-Glance for a high-level view into the AutoFocus service and key use-cases.

Palo Alto Networks,
  • 3
  • 4172

Public Cloud At A Glance

Regardless of where your applications and data are located, they are an attacker’s target, and protecting them in the cloud introduces the same security challenges you face in your on-premises data center. To that end, your public cloud security solution should be consistent with what is deployed in your data center so that, no matter where the applications and data reside, security is consistent and assured.

  • 0
  • 3709

Sample SaaS Application Report

The SaaS Application Usage Report summarizes actionable insight into SaaS application use in your organization for the 7 days captured in this report. Unsanctioned SaaS applications are SaaS Applications not approved or monitored by your security organizations. Unsanctioned applications could present a risk to your organization.

  • 0
  • 4452

PA-500 Specsheet

Key features, performance capacities and specifications for our PA-500.

  • 7
  • 50690

Palo Alto Networks Consulting Services Datasheet

Consulting Services are foundational to our approach for helping customers achieve the highest degree of protection and remain safe from security threats.

  • 2
  • 3167

Managing Security Solutions

The market for managed security services (MSS) continues to grow at double-digit rates. Many CSOs see MSS as a credible way of reducing costs while gaining access to specialized security expertise and 24/7 monitoring capabilities

Palo Alto Networks,
  • 1
  • 319
Displaying 31 to 60 of 70