As recent headlines illustrate, malicious actors are improving their ability to compromise organizations with increasing usage of automated tools to scaletheir attacks. The malware distribution mechanism that malicious actors are coming to rely on in order to generate profits from their activity, like holding files for ransom or stealing information for resale, are exploit kits. Exploit kits are server-based frameworks that automate the exploitation of vulnerabilities on target machines, most commonly while victims are browsing the web. While an increasingly urgent challenge, exploit kits can be thwarted with the right security technology and risk management processes. Unit 42, the Palo Alto Networks® threat intelligence team, recently released an in-depth report on exploit kit history, evolution and effective defenses.

 


 

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.

  • 56
  • 149231

PA-800 Series Datasheet

Palo Alto Networks PA-800 Series next-generation firewall appliances are designed to secure enterprise branch offices and midsized businesses.

  • 6
  • 36786

Protect Yourself From Antivirus

Traditional antivirus is not the solution to preventing endpoint breaches—it’s the problem. If you’re still using antivirus you are leaving your organization vulnerable to malicious attack.

Santa Clara, CA
  • 5
  • 19097

PA-5200 Series Datasheet

Key features, performance capacities and specifications for our PA-5200 Series.

  • 1
  • 34509

PA-220 Datasheet

Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices and retail locations.

  • 7
  • 32421

PA-3000 Series Specsheet

Key features, performance capacities and specifications of the Palo Alto Networks PA-3000 Series.

  • 14
  • 71385