The PA-3200 Series secures all traffic, including encrypted traffic, using dedicated processing and memory for networking, security, threat prevention and management.
The Palo Alto Networks Unit 42 Log4Shell Compromise Assessment provides world-class investigative expertise to identify the Log4Shell vulnerability, hunt for threats, and reduce uncertainty.
Palo Alto Networks’ Unit 42 brings together world-renowned threat researchers with an elite team of incident responders and security consultants to create an intelligence driven, response ready organization passionate about helping customers more proactively manage cyber risk.
Palo Alto Networks’ Unit 42 brings together world-renowned threat researchers with an elite team of incident responders and security consultants to create an intelligence driven, response ready organization passionate about helping customers more proactively manage cyber risk.
Prisma™ Cloud Compute Edition delivers cloud workload protection (CWPP) for modern enterprises, providing holistic protection across hosts, containers, and serverless deployments in any cloud, throughout the application lifecycle.
Unit 42 brings together world-class cyber researchers and elite incident responders to protect our digital way of life. With a deep-rooted reputation in delivering industry-leading threat intelligence, Unit 42 is now expanding its scope to provide state-of-the-art incident response and cyber risk management services. Our incident response consultants will serve as trusted partners to respond fast and contain threats completely, so you can get back to business in no time.
Unit 42 has seen a 188% increase in cloud incident response cases in the past three years. And more than a third of our non-cloud cases touch cloud assets in one way or another.
Use of Palo Alto Networks’ WildFire APIs, WildFire threat intelligence (including in the form
of data, verdicts, reports, and analysis), and any derivative works based on any WildFire or
WildFire-related services (collectively, the “WildFire Technology”) is subject to this
Acceptable Use Policy.
Palo Alto Networks offers a comprehensive SASE solution that brings together networking and network security services in a single cloud-based platform to help you safely adopt SaaS applications.
The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service
DLP helps safeguard a company’s reputation by preventing data breaches and assists in meeting compliance requirements for regulations like PCI-DSS, HIPAA, GDPR, CCPA etc.
Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. The purpose of this document is to provide customers of Palo Alto Networks with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the service.
The new Prisma Access pricing model allows customers to consume the capabilities of Prisma Access aligned to their business needs in a manner that delivers the fastest ROI.
This service description document (“Service Description”) outlines the terms and descriptions for the use of a Unit 42 cybersecurity risk assessment designed to mitigate the ransomware threat (“RRA Services”), you (“Customer”) have purchased from Palo Alto Networks, Inc. (“Palo Alto Networks”).
Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in this datasheet. This document provides the customers of Palo Alto Networks with information needed to assess the impact of WildFire on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within WildFire and its associated components.
CortexTM XSOAR is a comprehensive security orchestration, automation and response (SOAR) platform that unifies case management, automation, real-time collaboration and threat intel management to serve security teams across the incident lifecycle.
This Essential Guide will walk you through the steps needed to automate your phishing response and how you can leverage out-of-the-box resources for quick deployment.
The Unit 42 Business Email Compromise (BEC) Readiness Assessment delivers a targeted cybersecurity risk assessment focused on all of the elements necessary to defend against BEC and other email-based attacks. Learn more in this datasheet.