By Product Category
By Industry
Displaying 31 - 60 of 106
Book
eBook: Cloud NGFW
Cloud NGFW eBook: Best-in-Class Security, Unparalleled Simplicity on AWS | Palo Alto Networks
Book
Software Firewalls for Dummies
Special Edition: Software Firewalls for Dummies - Palo Alto Networks
Book
Cortex XSIAM: The Machine-Led, Human-Empowered Security Platform
Discover Cortex XSIAM, an integrated security platform combining the strength of SIEM (Security Information and Event Management), AI (Artificial Intelligence), ML (machine learning) advanced automation, SOAR (Security Orchestration, Automation, and Response), and identity threat detection. Revolutionize your organization's cybersecurity with enhanced threat detection, proactive incident response, and comprehensive visibility across your digital environment. Stay one step ahead of evolving cyber threats with Cortex XSIAM's powerful analytics, real-time monitoring, and streamlined workflows. Protect your critical assets and safeguard your business with this advanced security solution.
Book
Defending Against Modern Web-Based Threats
Learn about the right methodology to detect evasive and unknown threats, and understand how Prisma Access Cloud SWG can help.
Book
Zero Trust Security to Protect All OT Environments
Learn how a Zero Trust strategy provides protection across OT assets and networks, remote operations, and 5G networks.
Book
Ahead for SLED: Conversations with Security Leaders in State and Local Government
State, local, and education (SLED) organization’s IT and security teams face challenges with implementing security solutions while often dealing with limited budgets and staffing. Additionally, they must navigate rules and regulations at state and local levels, as well as federal regulations and requirements. This e-book showcases real-world conversations with SLED security leaders who discuss how Cortex XDR, Cortex XSOAR, and Cortex Xpanse help minimize those challenges via automation, analytics, and machine learning to transform their security operations.
References and Case Studies
How Eight Organizations Transformed Their Security Operations with Cortex
SOC teams need AI—the right models, resources, and data—to automate cybersecurity, so they can handle the volume and sophistication of the threats seen on networks today. Customers use Cortex to elevate their SOC teams and improve their results, all while making security more visible, comprehensive, and future-ready. Discover how.
Book
The Complete Guide to Kubernetes Security
Kubernetes security guide to design a security strategy to reinforce Kubernetes-based processes and implement automated, scalable solutions to address vulnerabilities.
Book
Cloud Security and Compliance for Dummies Guide
Evaluate your cloud security and compliance options. Read the pivotal step-by-step guide on how to secure your cloud, now and in the future.
Book
Stages of a Ransomware Attack: How to Weather the Storm and Emerge Stronger than Before
Don’t let threat actors exploit your organization with ransomware. Learn the stages of a ransomware attack and how to improve ransomware incident readiness now.
Book
Closing security gaps for connected devices in healthcare
This ebook breaks down these risks and shows how an automated Zero Trust approach to connected device security can close the gaps.
Book
2023 Benchmark Report on IoT Security
Learn how top-performing organizations use advanced IoT security to protect network-connected devices from known and unknown threats.
Book
The 6 Key Requirements for Multicloud Security
Multicloud Security: Discover 6 requirements to optimize security across cloud environments and empower cloud admin and DevSecOps teams with our actionable e-book.
Book
Unleash the Full Power of Your Palo Alto Networks Technology
For decades, technology companies have placed the primary responsibility of installing, managing, adopting, maintaining and ultimately extracting the maximum value of solutions on customers.
Book
Monetizing 5G Security: Moving from Cost Center to Profit Center
The reliability and performance of 5G are why organizations find it key to their digital transformations.
Book
How Six Organizations Transformed Their Networking and Security with Prisma SASE
Learn how six organizations have transformed their networking and security with Prisma SASE in this ebook.
Book
The SMB Guide to Affordable, Enterprise-Grade Security
Read this ebook to learn the right combination of skills, tools, and tactics to dramatically improve your business' security posture.
Book
Advanced Threats Require Advanced Defenses
This eBook provides information about the evolving threat landscape; where adversaries are taking advantage of defensive gaps; and security capabilities required as part of modern defense.
Book
The Essential Guide to MITRE ATT&CK Round 4
For the fourth round of the MITRE ATT&CK Evaluations, 30 vendors participated to see how their solutions stacked up to protect and defend against the tactics, techniques and procedures leveraged by two very relevant and sophisticated threat groups Wizard Spider and Sandworm. This e-book will help you understand the results from the evaluations, providing an objective look at how the vendors performed, with guidance on how to explore the results further.
Book
The Essential Guide to XDR for Government Security Operations
Government agencies face unique security challenges, including the need for tools that provide visibility and enhanced operational efficiency over large, federated, geographically distributed networks. Read this Essential Guide to XDR to learn about XDR, its applications and use cases, and how investing in it today can protect you against tomorrow’s threats. See why XDR has emerged as a market category that integrates network, cloud and endpoint data to help you detect and eliminate threats before the damage is done.
Book
The Essential Guide to XDR
Read this Essential Guide to XDR to learn about XDR, its applications and use cases, and how investing in it today can protect you against tomorrow’s threats. See why XDR has emerged as a market category that integrates network, cloud and endpoint data to help you detect and eliminate threats before the damage is done.
Book
Top Ten Questions to Ask a Digital Experience Monitoring Vendor
By 2026, at least 60% of I&O leaders will use digital experience monitoring to measure application, services and endpoint performance from the user’s viewpoint, according to Gartner’s Market Guide for Digital Experience Monitoring. As employees increasingly work from home and remote locations, the demand for smoother, consistent, experiences to the critical applications they rely on increases in order to ensure optimal productivity and business results.
Book
Respond to Cyber Threats in Record Time
Speed up your response time to cybersecurity incidents to minimize the damage and improve your security posture. Read our e-book to learn more.
Book
A Threat-Informed Approach to Sustainable Cyber Resilience
See how you can apply threat intelligence to continuously evolve your security strategy and strengthen your defenses.
Book
Transform Your Security Strategy
Learn how to transform your security strategy with a threat-informed approach. Read our e-book.
Book
Assess Your Organization's Security Posture
Take a threat-informed approach to assess, test and communicate your security program to reduce the impact of a cyberattack.
Book
Bringing Zero Trust Security to the Public Cloud
You’ve got a lot of public cloud options. But what’s not optional is security.
Book
Operationalizing DevSecOps
Continuous Authority to Operate (cATO) requires visibility of cybersecurity activities, monitoring of RMF controls, real-time response to cyberthreats, and DevSecOps.
Book
Reimagine Your Security with Expert Guidance
Learn how Palo Alto Networks Professional Services can guide your digital transformation journey and supplement critical gaps in your security team.
Book
Protecting Your Network From Evolving DNS-Layer Threats
Secure your DNS traffic and learn how to protect your organization from sophisticated DNS-based attacks.
Displaying 31 - 60 of 106