Describes how you can use automation along with the elements of the Palo Alto Networks Security Operating Platform to increase the speed, consistency, quality, and reliability of the tasks they perform
Next-generation implies that new methods of processing and securing network traffic are being used to provide visibility and control over traffic, applications, and threats. Enterprise security deals with threat protection for large and complex organizations; while cybersecurity scales the vast landscape of the Internet riddled with vulnerabilities and viruses.
Palo Alto Networks® engaged independent data privacy risk management provider TRUSTe® to review and document the data flows and practices described in the following datasheets. The purpose of these documents is to provide customers of Palo Alto Networks with information needed to assess the impact of these services on their overall privacy posture by detailing how personal information may be captured, processed and stored by and within the services.
Prisma SaaS Privacy Datasheet
AutoFocus Privacy Datasheet
Prisma Access Privacy Datasheet
Cortex Data Lake Privacy
Cortex XDR Privacy Datasheet
Traps Privacy Datasheet
URL Filtering Privacy Datasheet
WildFire Privacy Datasheet