Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400 (Updated April 25)
Read More
Muddled Libra’s Evolution to the Cloud
Read More
It Was Not Me! Malware-Initiated Vulnerability Scanning Is on the Rise
Read More
Sign In
Customer
Partner
Employee
Research
Create Account
EN
Get Started
Contact Us
Resources
Get Support
Under Attack?
Products
Solutions
Services
Partners
Company
More
Sign In
Sign In
Customer
Partner
Employee
Research
Create Account
EN
Language
Get Started
Contact Us
Resources
Get support
Under Attack?
Unit 42 Threat Research
Palo Alto Networks: Resource Center Infographics
Explore & download infographics that bring cybersecurity strategies to life
Explore Infographics
CLEAR
Filters
Filtered by:
CLEAR ALL
Date
Start date
End date
Search by date
Last week
Last 30 days
Last 6 months
Last year
Topic
Network Security (
25
)
Cloud Security (
22
)
Public Cloud Security (
8
)
Private Cloud Security (
8
)
Network Security Management (
7
)
Secure Access Service Edge (SASE) (
6
)
Amazon Web Services (
4
)
Zero Trust (
4
)
Security Operations (
3
)
Saas Security (
3
)
Threat Detection and Prevention (
3
)
Security Ecosystem (
3
)
Data Center (
3
)
Attack Surface Management (
2
)
Google Cloud (
2
)
Microsoft Azure (
2
)
Security Operating Platform (
2
)
Mobile Security (
2
)
Microsoft Hyper-V (
1
)
Secure Remote Workforce (
1
)
+ Show More
Industry
Healthcare (
4
)
Federal Government (
2
)
Financial Services (
2
)
Utilities & Energy (
1
)
State & Local Government (
1
)
Other Industries (
1
)
ICS SCADA (
1
)
Manufacturing (
1
)
Retail (
1
)
+ Show More
Products
Prisma Cloud (
15
)
Unit 42 (
11
)
NGFW (
11
)
Cortex XDR (
10
)
VM-Series (
7
)
Cortex XSOAR (
6
)
Cortex (
5
)
Prisma SASE (
5
)
IoT Security (
5
)
Prisma Access (
5
)
Prisma SD-WAN (
3
)
Cortex Xpanse (
3
)
Zero Trust (
3
)
Cortex XSIAM (
3
)
DNS Security service (
2
)
URL Filtering (
2
)
SaaS Security (
2
)
Enterprise DLP (
2
)
Threat Prevention (
2
)
WildFire (
2
)
Cloud NGFW (
1
)
Panorama (
1
)
Threat Intel Management (
1
)
+ Show More
Services
Proactive Assessments (
5
)
Cyber Risk Management (
5
)
Incident Response (
5
)
Educational and Professional Services
Type
Infographic (
100
)
Other (
2
)
Interactive Content (
1
)
White Paper (
1
)
Research Reports (
1
)
Don't see what you're looking for? Check out the Resource Center.
Browse all resources
Results
Don't see what you're looking for? Check out the Resource Center.
Browse all resources
Displaying
19–36
of
100
Results
Sort by
newest
Relevance
Newest
Oldest
Trending
Infographic
6 Ways to become an advocate for Network Security
Download the infographic
Infographic
Build Your Cyber Resilience in 3 Steps
Download the infographic
Infographic
Future-Proofing Your Proxy Architecture
Download the infographic
Infographic
XSIAM Infographic
Download the infographic
Infographic
Next-Gen SD-WAN: The Branch of the Future
Download the infographic
Infographic
Unit 42 Cloud Threat Report, Volume 7: From Misconfigured Firewall to Cryptojacking Botnet
Download the infographic
Infographic
The Evolution of Modern Networking Challenges
Download the infographic
Infographic
Unit 42 Cloud Threat Report, Volume 7: From SIM-Swap to Data Leak on the Dark Web
Download the infographic
Infographic
5 Ways to Help Defend Against the Next Big Cyberattack
Download the infographic
Infographic
CIEM: Identity Is the New Perimeter
Download the infographic
Infographic
5 Key Features of Proactive EDR
Download the infographic
Infographic
8 Essential Capabilities of an Effective Healthcare Security Platform
Download the infographic
Infographic
The State of the Global Attack Surface
Download the infographic
Infographic
Unit 42 Cloud Threat Report, Volume 7: Navigating the Expanding Attack Surface
Download the infographic
Infographic
SOC Transformation Infographic
Download the infographic
Infographic
A Comparison: Cloud Secure Web Gateway (SWG) in Prisma Access vs. web proxy appliances
Download the infographic
Infographic
7 Reasons Healthcare Organizations Choose Us
Download the infographic
Infographic
Overcoming Cybersecurity Complexity
Download the infographic
1
2
3
4
5
6