Introducing Idira, the next-generation identity security platform.
Sign In
Customer
Partner
Employee
Login to download
Join us to become a member
EN
Contact Us
What's New
Get Support
Under Attack?
Products
Solutions
Services
Partners
Company
More
Sign In
Sign In
Customer
Partner
Employee
Login to download
Join us to become a member
EN
Language
Contact Us
What's New
Get support
Under Attack?
Demos and Trials
Palo Alto Networks: Resource Center Ebooks
Download & read high quality Ebooks, provide for free, from the Cybersecurity Industry Leader Palo Alto Networks
paloaltonetworks
Explore Ebooks
Clear
Filters
Filtered by:
CLEAR ALL
Date
Start date
End date
Search by date
Last week
Last 30 days
Last 6 months
Last year
Topic
Network Security (
25
)
Cloud Security (
18
)
Zero Trust (
16
)
Identity Security (
14
)
Human Identities (
8
)
Secure Access Service Edge (SASE) (
8
)
Cybersecurity (
7
)
Private Cloud Security (
5
)
Public Cloud Security (
4
)
Network Security Management (
4
)
Security Operations (
3
)
Saas Security (
3
)
Threat Detection and Prevention (
3
)
Amazon Web Services (
3
)
Security Operating Platform (
3
)
Data Center (
3
)
Google Cloud (
2
)
Mobile Security (
2
)
Microsoft Azure (
2
)
Data Security (
2
)
Security Ecosystem (
2
)
GDPR (
1
)
Machine Identities (
1
)
Remote Workforce (
1
)
HIPAA (
1
)
SOX (
1
)
Compliance (
1
)
PCI-DSS (
1
)
Secure Remote Workforce (
1
)
Attack Surface Management (
1
)
Agentic Identities (
1
)
+ Show More
Industry
Healthcare (
6
)
Manufacturing (
3
)
High Technology (
3
)
Education (
2
)
Federal Government (
2
)
Utilities & Energy (
1
)
Technology (
1
)
K-12 Education (
1
)
State & Local Government (
1
)
Other Industries (
1
)
Higher Education (
1
)
Financial Services (
1
)
+ Show More
Products
Hardware Firewalls (
20
)
Prisma Cloud (
19
)
Unit 42 Managed Detection & Response (
16
)
Prisma SASE (
12
)
Cortex XDR (
11
)
Software Firewalls (
8
)
Prisma SD-WAN (
7
)
Cortex XSIAM (
6
)
Prisma Access (
5
)
Prisma Browser (
5
)
Cortex XSOAR (
5
)
Cortex (
4
)
Enterprise Device Security (
4
)
Cortex Cloud (
4
)
Identity and Access Management (
4
)
Prisma AIRS (
4
)
Cortex Xpanse (
4
)
Panorama (
4
)
Identity Threat Detection Response (
3
)
Advanced Threat Prevention (
3
)
Advanced URL Filtering (
3
)
Advanced DNS Security (
3
)
User Access Reviews (
3
)
Identity Governance (
3
)
Endpoint Privilege Manager (
3
)
PAN-OS (
3
)
Identity Lifecycle Management (
2
)
Enterprise Data Loss Prevention (
2
)
AI Access Security (
2
)
Cloud Posture Security (
2
)
Privileged Access Management (
2
)
Advanced WildFire (
2
)
Identity Security Posture Management (
1
)
SaaS Security (
1
)
Strata Cloud Manager (
1
)
Application Security (
1
)
Workforce Password Management (
1
)
Agentic Identity Security (
1
)
Secrets Management (
1
)
Next-Gen CASB (
1
)
+ Show More
Services
Incident Response (
11
)
Cyber Risk Management (
8
)
Unit 42 Managed Services (
3
)
Managed Detection & Response (
2
)
Unit 42 Incident Response (
2
)
Unit 42 Retainer (
1
)
Digital Forensics (
1
)
Proactive Assessments (
1
)
Unit 42 Proactive Services (
1
)
Board of Directors & CISO Advisory (
1
)
Customer Success (
1
)
Compromise Assessment (
1
)
+ Show More
Educational and Professional Services
+ Show More
Type
Book (
140
)
Guide (
8
)
Research Reports (
7
)
White Paper (
3
)
Other (
2
)
Article (
1
)
Customer Story (
1
)
Infographic (
1
)
+ Show More
Don't see what you're looking for? Check out the Resource Center.
Browse all resources
Results
Don't see what you're looking for? Check out the Resource Center.
Browse all resources
Displaying
1 to 18
of
158
158
Results
Sort By
newest
Relevance
Newest
Oldest
Trending
Book
The Gorilla Guide to Practical Endpoint Privilege Management
Read the eBook
Book
Why Workforce Password Management Is Nonnegotiable
Read the eBook
Book
Migrating PAM from Self-Hosted to SaaS eBook
Read the eBook
Book
Secure Every Identity: Privileged Access Controls eBook
Read the eBook
Book
Find Risk and Fix It Fast: Your Identity Posture Playbook eBook
Read the eBook
Book
The Six Best Practices for Executing an Effective and Efficient UAR
Read the eBook
Whitepaper
PAM Buyer's Guide: Smart Privileged Identity Controls
Download the whitepaper
Whitepaper
Identity Threat Detection
Download the whitepaper
Book
Key Considerations for Securing Machine Identities
Read the eBook
Book
AI Agents: Third-Party Risks & Insider Threats
Read the eBook
Book
Keeping Enterprise Secrets Under Control & Secure
Read the eBook
Book
2025 Identity Security Landscape
Read the eBook
Book
Nine Best Practices for Workstation Protection
Read the eBook
Book
Are Machines Your Weakest Link in a Security Audit?
Read the eBook
Book
Buyer's Guide to Managing Endpoint Privileges
Read the eBook
Book
Beyond the Login: Modern Identity Security for the Workforce
Read the eBook
Book
Post-Login Threats That Keep CISOs Up At Night
Read the eBook
Book
The Quantifiable Case for SOC Transformation
Read the eBook
1
2
3
4
5
6
7
8
9
Get the latest news, invites to events, and threat alerts
Products and Services
AI-Powered Network Security Platform
Secure AI by Design
Prisma AIRS
AI Access Security
Cloud Delivered Security Services
Advanced Threat Prevention
Advanced URL Filtering
Advanced WildFire
Advanced DNS Security
Enterprise Data Loss Prevention
Enterprise IoT Security
Medical IoT Security
Industrial OT Security
SaaS Security
Next-Generation Firewalls
Hardware Firewalls
Software Firewalls
Strata Cloud Manager
SD-WAN for NGFW
PAN-OS
Panorama
Secure Access Service Edge
Prisma SASE
Application Acceleration
Autonomous Digital Experience Management
Enterprise DLP
Prisma Access
Prisma Browser
Prisma SD-WAN
Remote Browser Isolation
SaaS Security
AI-Driven Security Operations Platform
Cloud Security
Cortex Cloud
Application Security
Cloud Posture Security
Cloud Runtime Security
Prisma Cloud
AI-Driven SOC
Cortex XSIAM
Cortex XDR
Cortex XSOAR
Cortex Xpanse
Unit 42 Managed Detection & Response
Managed XSIAM
Next-Generation Identity Security
Privileged Access Management
Identity and Access Management
Endpoint Privilege Manager
Identity Governance
Workforce Password Management
Agentic Identities
Secrets Management
Unified Secrets Governance
Application Credentials Delivery
Vendor Privileged Access
Threat Intel and Incident Response Services
Proactive Assessments
Incident Response
Transform Your Security Strategy
Discover Threat Intelligence
Company
About Us
Careers
Contact Us
Corporate Responsibility
Customers
Investor Relations
Location
Newsroom
Popular Links
Blog
Communities
Content Library
Cyberpedia
Event Center
Manage Email Preferences
Products A-Z
Product Certifications
Report a Vulnerability
Sitemap
Tech Docs
Unit 42
Do Not Sell or Share My Personal Information