User-based access controls are steadily becoming and integral component of the network security infrastructure and threat prevention measures. This brief explains why establishing and implementing a user-based security strategy is not a single team’s effort, and should be rooted in the business leadership team’s position on cybercrime prevention.


Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.

  • 73
  • 195356

2018 Predictions & Recommendations: Automated Threat Response Technology in OT Grows Up

Automated threat response, which we’ll simply refer to as ATR, is the process of automating the action taken on detected cyber incidents, particularly those deemed malicious or anomalous. For each type of incident, there is a predefined action for containment or prevention where newer technologies, such as behavioral analytics and artificial intelligence, are utilized to bring incidents of interest to the surface.

  • 4
  • 26161

PA-5200 Series Datasheet

Key features, performance capacities and specifications for our PA-5200 Series.

  • 7
  • 56598

PA-800 Series Datasheet

Palo Alto Networks PA-800 Series next-generation firewall appliances are designed to secure enterprise branch offices and midsized businesses.

  • 10
  • 57414

PA-220 Datasheet

Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices and retail locations.

  • 13
  • 51077

PA-3000 Series Specsheet

Key features, performance capacities and specifications of the Palo Alto Networks PA-3000 Series.

  • 18
  • 88079