Displaying 121 - 150 of 414
Datasheet
Ransomware Readiness Assessment
The Unit 42 Ransomware Readiness Assessment focuses on preparing your people, processes, and technologies to mitigate the threat of ransomware. We work with you to develop control enhancements, remediation recommendations, and a best-practice playbook based on the latest threat intelligence to achieve a target state of ransomware readiness. Read datasheet to learn more.
Datasheet
Cortex XDR Standard and Premium Success Plans
Get the most out of Cortex XDRTM with access to the Customer Success team to maximize adoption and strengthen your security posture.
Datasheet
Business Email Compromise Readiness Assessment
The Unit 42 Business Email Compromise (BEC) Readiness Assessment delivers a targeted cybersecurity risk assessment focused on all of the elements necessary to defend against BEC and other email-based attacks. Learn more in this datasheet.
Datasheet
Cortex XSOAR Customer Success Datasheet
Understand how Customer Success will dramatically help you get the most value out of Demisto
Datasheet
Tip Sheet: Data Security
Data security tips to safeguard your sensitive information from unauthorized access, theft, and data loss using encryption, access control, backups, and more.
Datasheet
Tip Sheet: CI/CD Security
CI/CD pipeline weaknesses are commonly exploited by attackers. Get data-based tips to fix CI/CD pipeline weaknesses and implement effective CI/CD security.
Datasheet
CI/CD Security Datasheet
Learn how to harden your CI/CD pipelines, reduce your attack surface, and protect your app development environment by adopting graph-based CI/CD security.
Datasheet
Cloud Code Security At a Glance
Datasheet
Palo Alto Networks Operational Resilience Program
Due to the recent and increasing volume of customer inquiries regarding the resilience program (e.g., framework, program components, alignment with leading standards, etc.), we developed a resilience focused narrative as a sales enablement artifact to be leverage across account teams, bid response, customer trust, and adjacent sales teams.
Datasheet
Cortex XDR Forensics
Cortex XDR Forensics brings powerful investigation and computer forensics capabilities to the industry's first extended detection and response platform.
Datasheet
Palo Alto Networks VM-Series and Endace EndaceProbe Analytics Program
Prevent, detect, and respond to even the most challenging cyber threats.
Datasheet
PA-800 Series Datasheet
The controlling element of the PA-800 Series is PAN-OS®, the same software that runs all Palo Alto Networks NextGeneration Firewalls. PAN-OS natively classifies all traffic, inclusive of applications, threats, and content, and then ties that traffic to the user regardless of location or device type.
Datasheet
5G Security with Palo Alto Networks ML-Powered NGFW and MantisNet Containerized Visibility Fabric
Visibility into Subscriber ID and Other 5G Identifiers for N6 NGFW Deployment
Datasheet
Advanced Deployment Service for CASB – Base Service
Next-Generation Cloud Access Security Broker (CASB) Professional Services securely enables adoption of SaaS applications.
Datasheet
Code Security
Secure Cloud-Native Applications and Infrastructure Across the Development Lifecycle
Datasheet
Manage Your Unmanaged Cloud with Cortex Xpanse and Prisma Cloud
Download the datasheet, Manage Your Unmanaged Cloud, to learn how Cortex® Xpanse™ automatically identifies and associates unknown cloud assets and allows command through Prisma® Cloud for complete cloud security and manageable policy enforcement.
Datasheet
Cortex Xpanse: Threat Response Center
Threat Response Center helps you stay ahead of emerging threats by being your single command center for effective vulnerability management.
Datasheet
Achieve Maximum Value from the Cortex Xpanse Active Response Module
Reducing critical attack surface exposure MTTRs from weeks to hours with AI-powered, embedded automation
Datasheet
Security Ratings and Prioritization Datasheet
Traditional security rating tools often provide incomplete data and assessments of attack surfaces, leading to difficulties in understanding the real-time security health and asset hygiene of an organization. The Cortex® Xpanse™ Security Rating addresses these challenges by offering a real-time security rating driven by exploit intelligence for the entire attack surface.
Datasheet
Unit 42 Managed Threat Hunting
By proactively hunting down threats, you can unmask every adversary, reduce dwell times, and avoid successful attacks.
Datasheet
PA-3400 Series
Palo Alto Networks PA-3400 Series ML-Powered NGFWs—comprising the PA-3440, PA-3430, PA-3420 and PA-3410—target high-speed internet gateway deployments. PA-3400 Series appliances secure all traffic, including encrypted traffic, using dedicated processing and memory for networking, security, threat prevention, and management.
Datasheet
Palo Alto Networks Cortex Xpanse and Sevco Asset Intelligence Platform
Gain a comprehensive view of your enterprise IT infrastructure and assets. Organizations have no visibility into their evolving attack surface due to accelerated digital transformation, remote work and constantly moving cloud assets.
Datasheet
Cortex XSIAM at a glance
Cortex® XSIAM™ is the automation-first platform for the modern SOC, harnessing the power of machine intelligence to radically improve security outcomes and transform security operations. XSIAM customers can consolidate multiple products into a single coherent platform, cutting costs and improving analyst experience and productivity.
Datasheet
DNS Security Service Privacy
The purpose of this document is to provide Palo Alto Networks customers of DNS Security Service with information needed to assess the impact of this service on their overall privacy posture by detailing how personal information may be captured, processed, and stored by 1 and within the service.
Datasheet
CI/CD Security Checklist
Learn Six Best Practices to Proactively Address CI/CD Pipeline Weaknesses
Datasheet
Tip Sheet: Secure Your Container Workloads
Get container security tips to help ensure the protection of your containerized applications, covering vulnerability scanning, compliance, and runtime monitoring.
Datasheet
Tip Sheet: Secure Your Application Programming Interfaces (APIs)
API security cheatsheet to protect your application interfaces from attacks using authentication, authorization, input validation, and monitoring.
Datasheet
Tip Sheet: Build Secure Applications and Infrastructure
Build secure applications and cloud infrastructure with tipsheet on robust security measures - risk assessment, penetration testing, continuous monitoring, and more.
Displaying 121 - 150 of 414