New Tool Set Found Used Against Organizations in the Middle East, Africa and the US
Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature
Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors
  • Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Research

Stages of a Ransomware Attack: How to Weather the Storm and Emerge Stronger than Before

Don’t let threat actors exploit your organization with ransomware. Learn the stages of a ransomware attack and how to improve ransomware incident readiness now.
See more

How Eight Organizations Transformed Their Security Operations with Cortex

SOC teams need AI—the right models, resources, and data—to automate cybersecurity, so they can handle the volume and sophistication of the threats seen on networks today. Customers use Cortex to elevate their SOC teams and improve their results, all while making security more visible, comprehensive, and future-ready. Discover how.
See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
By Type

By Type

  • Book (75)
  • Guide (5)
  • White Paper (4)
  • Infographic (1)
By Product Category

By Product Category

By Industry

By Industry

  • Healthcare (3)
  • Federal Government (3)
  • Manufacturing (2)
  • Technology (1)
  • Education (1)
  • State & Local Government (1)
  • Retail (1)
  • Financial Services (1)
  • + Show More
By Topic

By Topic

  • Network Security (20)
  • Cloud Security (14)
  • Secure Access Service Edge (SASE)  (9)
  • Public Cloud Security (6)
  • Amazon Web Services (6)
  • Zero Trust (6)
  • Private Cloud Security (5)
  • Network Security Management (4)
  • Security Operating Platform (4)
  • Google Cloud (3)
  • Saas Security (3)
  • Microsoft Azure (3)
  • Threat Detection and Prevention (3)
  • Data Center (3)
  • Security Ecosystem (2)
  • Mobile Security (2)
  • Attack Surface Management (1)
  • Security Operations (1)
  • Remote Workforce (1)
  • Compliance (1)
  • Secure Remote Workforce (1)
  • + Show More
Displaying 61 - 90 of 91
Pagination
  • 1
  • 2
  • 3
  • 4

Book

Security Hygiene and Posture Management

Read this e-brief to gain insights on assessing security posture management processes, examining vendor risk management requirements, and testing security more frequently.
November 17, 2021

Book

Navigating the SaaS Security Jungle

In this ebook, learn about the current challenges of SaaS adoption, why traditional remedies don’t work and how to safely adopt SaaS apps and secure data with an integrated CASB available from both your network firewall and SASE platforms.Take back visibility and control over applications, users and data by keeping pace with the SaaS explosion in your enterprise.
November 16, 2021

Book

An Ounce of Prevention: Investing in Incident Response

View ESG's study now to get your organization on track with an incident response plan, SOP and best-practice steps to instill confidence in your cybersecurity defenses.
July 28, 2021

Book

The Essential Guide to MITRE Round 3 Evaluations

Read how Cortex® XDR™ performed, including how it blocked 100% of attacks in the protection evaluation on both Windows® and Linux endpoints.
May 26, 2021

Book

Better together - Internet2 and Palo Alto Networks

Today’s higher education security professionals need every advantage they can get.
May 13, 2021

Book

E-Book: The Maturation of Cloud Native Security

Cloud-native security evolution e-book lays out cutting-edge strategies to enhance data protection and unlock the full potential of your cloud-native environment.
April 21, 2021

Book

Live Long and Migrate: How virtual firewalls from Palo Alto Networks secure your migration to AWS

By now, the majority of businesses have at least begun their journey to the cloud, with many adopting Amazon Web Services (AWS) to free up resources and lower IT costs.
April 7, 2021

Book

Best of DevSecOps: Trends in Cloud Native Security Practices

DevSecOps eBook: Enhance resilience with security integration throughout the software delivery process. Explore trends & insights from The New Stack partnership.
March 1, 2021

Book

10 Tenets for an Effective SASE Solution

Enabling users to access the cloud securely and securing applications in the cloud are the two main challenges organizations are facing today. Secure Access Service Edge (SASE) combines network and network security services into one cloud-delivered solution, providing organizations with simplified management, consistent visibility and better network protection across users, devices and applications, no matter their location. This ebook will take you through the 10 requirements to keep in mind as you look for a comprehensive SASE solution.
February 17, 2021

Book

Kubernetes Fundamentals

Master Kubernetes basics with this ebook: explore control planes, worker nodes, service discovery, storage, networking, cloud-scale computing and adoption.
January 13, 2021

Book

The Impact of XDR in the Modern SOC

Read the survey results today to learn more about the current challenges in the modern SOC and how XDR can help solve them
January 5, 2021

Book

Secure Your IoT Investments While Keeping Business As Usual

This article discusses how CISOs can take advantage of an IoT Security solution that leverages existing IT resources, and without disrupting existing processes and best practices.
November 15, 2020

Book

The Critical Role of a Secure VPN

Learn about the critical role a secure VPN plays in securing your remote workforce. From VPN and remote access VPN, to site-to-site VPN, there are many options from which to choose.
November 5, 2020

Book

Inside PAN-OS----World's first ML-Powered NGFW shifts the cybersecurity paradigm

Find out how PAN-OS with the world's first ML-Powered NGFW enable you to proactively stop threats, secure IoT devices, reduce errors with automatic policy recommendations, and much more. Get a close look at the features that make PAN-OS 10.0 the new standard for network security.
August 26, 2020

Book

Data Center and Hybrid Cloud Security for Dummies

Boost Security with Automation: Get this eBook for best practices and approaches to protect data and applications in on-prem data centers and multicloud environments.
July 30, 2020

Book

Cloud Security That Strikes the Perfect Chord - How Palo Alto Networks and AWS work in concert to harmonize your cloud security

AWS Security Hub and Amazon GuardDuty e-book to help you achieve compliance and visibility in your cloud environment and get the most value from your AWS services.
June 23, 2020

Book

Why Native Security Controls in Public Clouds Are Not Enough

Read this eBook to understand why virtual firewalls are vital for protecting networks and data in public clouds.
March 11, 2020

Book

Secure Manufacturing for Industry 4.0

Read this new e-book to learn the five primary ways to address demand for effective cybersecurity in manufacturing.
January 8, 2020

Book

The New Container-Driven Security Solution

Learn how four key characteristics (automation, integration, visibility, and flexibility) shape a modern, container-based security solution in this eBook.
January 6, 2020

Book

Broaden Your Managed Security Services Footprint with Palo Alto Networks

This ebook explains why MSSPs need to rely on a comprehensive yet cohesive set of security solutions to accelerate their customer's transition to managed services and thereby broaden their own footprint into new markets.
December 12, 2019

Book

Consistent Security with SD-WAN

As more enterprises embrace digital transformation and move applications to the cloud, IT teams are challenged to connect corporate and remote users to critical business resources quickly, reliably, and securely. SD-WAN promises to increase bandwidth and improve connectivity, but organizations must be careful not to compromise security for performance or simplicity. In this eBook, you'll learn which key SD-WAN features and capabilities to consider to keep users connected and data secure.
November 13, 2019

Book

451 Research Business Impact Brief – Security in SD-WAN: Centralized management means better control

Read this 451 Research Brief to learn about the top four business benefits of integrated SD-WAN and security to simplify operations and extend uniform protection from the data center and cloud all the way to the branches.
November 13, 2019

Book

Serverless and Secure

Secure serverless computing with best practices to build secure and reliable AWS Lambda-based apps in this e-book covering logging, auditing, permissions, etc.
November 13, 2019

Book

eBook: Cloud Security and Compliance Best Practices for Retail

6 guiding principles to secure retail environments running on Google Cloud Platform (GCP) in this free e-book on cloud security and compliance best practices.
October 21, 2019

Book

Security for Cloud Native Architectures

Boost security for cloud native architecture with this e-book on containerized apps, microservices, serverless functions, CI/CD workflows and more best practices.
September 16, 2019

Book

MNO’s Guide to Buying a 5G-Ready Next Generation Firewall

With industries moving toward automation and hyperscale, a wide range of use cases such as massive IoT, mission-critical IoT, smart cities, smart grids, and smart factories—to name a few—are on their way to coming into reality with 5G—the single most powerful enabler of ubiquitous connectivity between users, devices, machines, and systems. In the new era of 5G, mobile network operators have the opportunity to move up the value chain and capitalize on net-new opportunities of revenue generation. The market opportunity with 5G-enabled industry 4.0 innovation is massive. However, to live up to its potential, your mobile network requires a wide variety of advanced security safeguards to safely deliver 5G-powered applications and services. As you prepare for your network transition to 5G, look for six essential capabilities in your 5G-ready next-generation firewall.
September 5, 2019

Guide

Next-Generation Firewalls For Dummies, Palo Alto Networks Limited Edition

IT continues to evolve, bringing with it unprecedented change. The network perimeter has all but disappeared. Data and users are everywhere. Devices are proliferating so quickly that most security teams can’t keep up.
August 22, 2019

Book

E-Book: Top 10 AWS Cloud Security Risks

Top 10 AWS Security Risks: Discover and remediate cloud security and compliance issues with Prisma Cloud. Learn from analyzed events, prioritize, and protect data.
August 9, 2019

Book

MNO's Guide to Buying a 5G-Ready Next Generation Firewall

Evolving network architectural changes vastly impact 5G security postures that mobile operators are required to adopt in their journey to 5G. As you prepare for your network transition to 5G, look for six essential capabilities in your 5G-ready next-generation firewall.
August 7, 2019

Guide

Continuous Monitoring & Compliance in the Cloud

Read this eBook to learn how continuous monitoring provides an essential, automated, up-to-date status of security posture – across multi-cloud environments, including AWS, Azure and GCP services – that can be used to make informed, cost effective, risk-based decisions about service configuration and vulnerabilities inherent in cloud deployments, and ultimately prevent cloud infrastructures from falling out of compliance.
June 5, 2019
Displaying 61 - 90 of 91
Pagination Bottom
  • 1
  • 2
  • 3
  • 4

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved