Date

By Type

By Industry

By Product Category

By Features

By Technology

By Services

By Audience

By Language

Displaying 31 to 60 of 104

PA-500 Datasheet

Key features, performance capacities and specifications for our PA-500.
  • 9
  • 57800

EU Data Protection Compliance When Securing SaaS Applications

The purpose of this white paper is to clarify how Networks Aperture™ SaaS security service can be used in compliance with EU data protection requirements, including the upcoming EU General Data Protection Regulation.
  • 0
  • 970

Prevention Architecture Methodology Overview

Begin your Prevention-based architecture journey
  • 0
  • 1219

Traps Datasheet

Palo Alto Networks Traps replaces traditional antivirus with a multi-method prevention approach that secures endpoints against known and unknown malware and exploits before they can compromise a system. Traps prevents security breaches and successful ransomware attacks, in contrast to detection and response after critical assets have been compromised. Traps Advanced Endpoint Protection: • Prevents cyberbreaches and successful ransomware attacks by preemptively blocking known and unknown malware, exploits and zero-day threats. • Protects and enables users to conduct their daily activities and use web-based technologies without concerns for known or unknown cyberthreats. • Automates prevention by autonomously reprogramming itself using threat intelligence gained from WildFire.
Santa Clara, CA
  • 29
  • 63076

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
  • 84
  • 225808

PA-3200 Series Datasheet

Palo Alto Networks® PA-3200 Series of next-generation firewalls comprises the PA-3260, PA-3250 and PA-3220, all of which are targeted at high-speed internet gateway deployments. The PA-3200 Series secures all traffic, including encrypted traffic, using dedicated processing and memory for networking, security, threat prevention and management.
  • 2
  • 17478

PA-220R Datasheet

PA-220R Datasheet
  • 4
  • 6727

Magnifier Datasheet

Magnifier Behavioral Analytics empowers organizations to quickly find and stop the stealthiest network threats. By analyzing rich network, endpoint and cloud data with machine learning, Magnifier accurately identifies targeted attacks, malicious insiders and malware. Security analysts can rapidly investigative threats and leverage the Next-Generation Firewall to block attacks before the damage is done. Download the datasheet to learn the key features and benefits of Magnifier.
  • 7
  • 10505

WildFire Datasheet

WildFire Datasheet
  • 7
  • 27050

VM-Series on Vmware

Key features, performance capacities and specifications of VM-Series for VMware.
  • 5
  • 24478

VM-Series on KVM

Key features, performance capacities and specifications of VM-Series on KVM.
  • 5
  • 9048

DELIVERING VM-SERIES SCALABILITY AND RESILIENCY FOR MICROSOFT AZURE

When deploying web applications in Microsoft® Azure®, the recommended approach to deliver scalability and resiliency is to utilize the cloud infrastructure, as opposed to following a traditional, physical data center approach. By leveraging native Azure-managed load balancing services, organizations can support their additional capacity and resiliency requirements.
  • 1
  • 244

VM-Series for Azure

Key features, performance capacities and specifications of VM-Series for Amazon Web Services.
  • 0
  • 6067

Palo Alto Networks and Cisco Application Centric Infrastructure

Maintaining your competitive edge in today’s business environment often hinges on how quickly you can deliver a new application or set of features to market. In some cases, the speed of application development and delivery may outstrip security policy deployment. The combination of Cisco® ACI™ and Palo Alto Networks® Next-Generation Firewall ensures security is deployed in lockstep as your application infrastructure expands, contracts and changes.
  • 1
  • 696

Transit VPC with the VM-Series on AWS Tech Brief

Organizations are rapidly migrating their enterprise applications and data onto Amazon ® Web Services. Just as they would in the data center, applications deployed on AWS ® often require outbound connectivity to applications housed in other virtual private clouds, as well as to resources located on the corporate network or the web. As the numbers of AWS accounts and VPCs grow, managing the many individual connections becomes complex and difficult, often slowing deployments. Another challenge lies in making sure the process of protecting applications and data does not become a bottleneck for new applica - tion deployments.
  • 0
  • 1802

VM-Series on Microsoft Hyper-V

Key features, performance capacities and specifications of VM-Series on Microsoft Hyper-V
  • 0
  • 873

Auto Scaling the VM-Series on AWS tech brief

Organizations are moving their enterprise applications onto AWS for a range of business reasons including scalability. The on-demand nature of AWS allows you to leverage core AWS features and services such as Auto Scaling and Elastic Load Balancing to build an application infrastructure that quickly and dynamically scales to address increased capacity demands dictated by inbound traffic. Common Auto Scaling scenarios include unplanned traffic spikes (e.g., time-based or seasonal variations; unplanned news events), and the addition of new applications. To ensure that your application environment is protected from cyberattacks, security will need to scale at the same pace as your workloads.
  • 0
  • 168

Aperture At A Glance

Aperture delivers complete visibility and granular enforcement across all user, folder and file activity within sanctioned SaaS applications.
  • 5
  • 15385

VM-Series on VMware NSX

Key features, performance capacities and specifications of VM-Series on VMware® NSX™.
  • 4
  • 4383

VM-Series for Amazon Web Services

https://www.paloaltonetworks.com/resources/datasheets/vm-series-amazon-web-services
  • 1
  • 10392

Hardware Replacement Services

Businesses today face an evolving array of cyberthreats that continue to gain sophistication. Therefore, your business requires a proactive approach to securing your network – one that will provide you with the assurance that you are always protected. Palo Alto Networks RMA and hardware replacement services are tailored to best fit your unique business requirements. In addition, advanced RMA services are designed specifically to help expedite the delivery of replacement hardware to minimize disruption.
  • 0
  • 3087

Australia Data Breach Guide

Cyberthreats are getting more sophisticated and prevalent, affecting society and economies. Consequently, government regulation is evolving to reflect this risk and drive confidence in the digital space. From 22 February 2018, Australian organisations that are subject to the Privacy Act will need to report data breaches to the affected parties and to the Office of the Australian Information Commissioner (OAIC). As businesses grapple with new requirements on data protection, aligning with the Notifiable Data Breach (NDB) scheme is essential. Managing this alignment successfully means not just ticking boxes, but holistically addressing their cyber risks and becoming state-of-the-art.
  • 0
  • 112

WildFire Privacy Datasheet

Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.
  • 2
  • 3454

Comparing the VM-Series and Security Groups

A quick review of the shared responsibilities model and how the VM-Series complements native public cloud security features such as Security Groups and Web application firewalls.
  • 2
  • 943

Professional Services Traps Implementation

The cyberthreat landscape continues to evolve rapidly and is becoming increasingly complex as new technologies emerge. Ensuring your organization is properly protected on the endpoint requires not only the most capable security products but also the most capable people. With this in mind, we have developed a dedicated team of highly skilled experts to provide you with the best possible services to protect your endpoints.
Santa Clara, CA
  • 0
  • 15422

PA-5000 Series Datasheet

Key features, performance capacities and specifications for our PA-5000 Series.
  • 11
  • 68702

PA-200 Datasheet

Key features, performance capacities and specifications for our PA-200.
  • 7
  • 39899

PA-3000 Series Datasheet

Key features, performance capacities and specifications for our PA-3000 Series.
  • 24
  • 100642

PA-800 Series Datasheet

Palo Alto Networks PA-800 Series next-generation firewall appliances, comprised of the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses.
  • 17
  • 77910

PA-220 Datasheet

Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices and retail locations.
  • 21
  • 68974
Displaying 31 to 60 of 104