By Product Category
By Industry
Displaying 61 - 90 of 107
Book
O'Reilly Cloud Native Security Cookbook
O'Reilly Cloud-native security cookbook helps you enhance AWS, Azure, and GCP security with expert insights and practical tips for cloud-native systems.
Book
Why Next-Gen SD-WAN Is the Solution for You Ebook
Read our complimentary e-book to discover the problems with legacy SD-WAN and how next-gen SD-WAN can help your organization stay connected while maintaining control and visibility.
Book
5 Best Practices for Securing Modern Web Applications and APIs
Securing web apps and APIs e-book outlines 5 best practices to fortify applications and APIs in cloud-native architectures for comprehensive protection.
Article
SASE for Dummies 2nd Special Edition
Enabling a secure hybrid workforce and supporting digital transformation have become top priorities for organizations everywhere.
Book
SASE for Dummies 2nd Special Edition
This Dummies book dives into the core capabilities and benefits of a secure access service edge (SASE) solution.
Book
Optimizing your business for a SASE transformation
Since it’s introduction as a concept in 2019, SASE has become a popular means of securely connecting hybrid workforces with the services they need.
Book
Accelerating Digital Transformation with SASE
In recent years, organizations have embraced new infrastructure and services to meet their rapidly changing needs. This has caused a dramatic increase in network complexity, limiting visibility, increasing security risks and making the network harder to manage.
Book
SASE CIO eBook: Driving the future of work through enterprise-wide SASE
In Driving the future of work through enterprise-wide SASE, IT leaders will gain knowledge and insights to help them successfully navigate their organizations through the transition to SASE, including diving into the architecture of SASE and the benefits it provides, exploring how organizations are achieving their most important IT goals through three SASE use cases, preparing to adopt SASE by exploring the implications and potential pitfalls, and more.
Book
Breaking Trust: Building Sustainable Security for 5G with Zero Trust
This eBook examines what Zero Trust means for 5G network environments, how to develop and implement an effective Zero Trust architecture, and how Palo Alto Networks takes a comprehensive approach to Zero Trust for enterprises.
Book
CN-Series Container Firewalls for Kubernetes
eBook: Protect Kubernetes Environments with CN-Series Firewalls
Book
Overcoming Enterprise Data Loss Prevention Challenges
This ebook discusses how CISOs can take advantage of a modern enterprise DLP solution that provides a fresh, simplistic yet comprehensive take on protecting confidential enterprise data.
Book
The Enterprise Buyer’s Guide to Next-Gen CASB
In this ebook we bring to you Palo Alto Networks’ point of view on taking an integrated approach to CASB. One that is tight to the rest of your security deployment and gives you the necessary visibility and control over all applications, users and data by keeping pace with the SaaS explosion in your enterprise.
Book
Five Key Challenges in Private Cloud Security
Make Private Cloud Security Real Visualize the Network Security Platform blueprint with its virtual firewall foundation.
Guide
How a Large Oil and Gas Company Implements Principles to Manage Cyber Risk
This playbook showcases our first-hand experience in helping an energy customer create a cyber resilience program. The playbook is complete with a situation overview, project plan summary and key lessons learned. To build the program, the customer focused on defining and implementing four key principles with specific success metrics to ensure continuous improvement. Read more about our experience in the playbook.
Guide
How a Regional Bank Established a Successful SOC Program
This playbook showcases our first-hand experience in helping a financial services customer establish a successful SOC.
Book
Security Hygiene and Posture Management
Read this e-brief to gain insights on assessing security posture management processes, examining vendor risk management requirements, and testing security more frequently.
Book
An Ounce of Prevention: Investing in Incident Response
View ESG's study now to get your organization on track with an incident response plan, SOP and best-practice steps to instill confidence in your cybersecurity defenses.
Book
The Essential Guide to MITRE Round 3 Evaluations
Read how Cortex® XDR™ performed, including how it blocked 100% of attacks in the protection evaluation on both Windows® and Linux endpoints.
Book
Better together - Internet2 and Palo Alto Networks
Today’s higher education security professionals need every advantage they can get.
Book
E-Book: The Maturation of Cloud Native Security
Cloud-native security evolution e-book lays out cutting-edge strategies to enhance data protection and unlock the full potential of your cloud-native environment.
Book
Live Long and Migrate: How virtual firewalls from Palo Alto Networks secure your migration to AWS
By now, the majority of businesses have at least begun their journey to the cloud, with many adopting Amazon Web Services (AWS) to free up resources and lower IT costs.
Book
Best of DevSecOps: Trends in Cloud Native Security Practices
DevSecOps eBook: Enhance resilience with security integration throughout the software delivery process. Explore trends & insights from The New Stack partnership.
Book
10 Tenets for an Effective SASE Solution
Enabling users to access the cloud securely and securing applications in the cloud are the two main challenges organizations are facing today. Secure Access Service Edge (SASE) combines network and network security services into one cloud-delivered solution, providing organizations with simplified management, consistent visibility and better network protection across users, devices and applications, no matter their location. This ebook will take you through the 10 requirements to keep in mind as you look for a comprehensive SASE solution.
Book
Kubernetes Fundamentals
Master Kubernetes basics with this ebook: explore control planes, worker nodes, service discovery, storage, networking, cloud-scale computing and adoption.
Book
The Impact of XDR in the Modern SOC
Read the survey results today to learn more about the current challenges in the modern SOC and how XDR can help solve them
Book
Secure Your IoT Investments While Keeping Business As Usual
This article discusses how CISOs can take advantage of an IoT Security solution that leverages existing IT resources, and without disrupting existing processes and best practices.
Book
The Critical Role of a Secure VPN
Learn about the critical role a secure VPN plays in securing your remote workforce. From VPN and remote access VPN, to site-to-site VPN, there are many options from which to choose.
Book
Inside PAN-OS----World's first ML-Powered NGFW shifts the cybersecurity paradigm
Find out how PAN-OS with the world's first ML-Powered NGFW enable you to proactively stop threats, secure IoT devices, reduce errors with automatic policy recommendations, and much more. Get a close look at the features that make PAN-OS 10.0 the new standard for network security.
Displaying 61 - 90 of 107