Demo: Preventing Credential-Based Attacks

Watch our product managers and threat researchers demonstrate how protections in the Palo Alto Networks platform neutralize an attacker's ability to steal credentials, as well as stop them from abusing stolen credentials to gain unauthorized access.


 

URL Filtering At-A-Glance

Learn how we provide safe web browsing with our URL Filtering service Reduce the risk of infection from dangerous websites and protect users and data from malware and credential-phishing pages Protection across the attack lifecycle through integration with WildFire and the Next-Generation Security Platform Keep protections synchronized with the latest threat intelligence through our cloud-based URL categorization for phishing, malware and undesired content Full visibility and threat inspection into normally opaque web traffic through granular control over SSL decryption
  • 4
  • 9611

Logging Service Privacy Datasheet

Logging Service Privacy Datasheet
  • 1
  • 3684

Single Pass Architecture

With the single-pass architecture, Palo Alto Networks makes it possible to add a function to a next-generation firewall, instead of adding another security device, and in such a way that the integrated approach actually offers cybersecurity benefits and advantages that discrete devices cannot.
  • 6
  • 14007

DNS Protection Technology Brief

DNS protection capabilities are supported by Palo Alto Network's Next Generation Security platform, protecting traffic from malware and other malicious activity.
  • 0
  • 4804

Simplify PCI Compliance with Network Segmentation PDF

Establishing, maintaining and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for all entities involved in payment card processing – including merchants, processors, acquirers, issuers, and service providers, as well as all other entities that store, process or transmit cardholder data (CHD) and/or sensitive authentication data (SAD). For all system components included in or connected to the Cardholder Data Environment (CDE), organizations must comply with more than three hundred requirements. It is in every organization’s best interest, therefore, to take advantage of network segmentation provisions stated in the PCI DSS to effectively isolate their CDE and thereby decrease the amount of infrastructure that is considered in scope. Download our use case "Simplify PCI Compliance With Network Segmentation" to learn how Palo Alto Networks Next-Generation Security Platform delivers maximum protection for an organization’s entire computing environment while greatly reducing the scope of PCI compliance.
  • 0
  • 1811

Cyber Threat Report: Reconnaissance 2.0

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
  • 0
  • 450