• download

The business model behind crimeware has changed. In the past, attackers typically profited from their malicious endeavors by stealing identities, or credit card numbers, and selling them on underground markets for a small fee. In recent years, the price for stolen records has plummeted, falling from $25 per record in 2011 to only $6 in 2016.1 This has necessitated new sources of income for cyber attackers, with many of them turning to ransomware due to recent advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data. Unit 42, the Palo Alto Networks® threat research team, reviews the past, present and future of ransomware in this report, including strategies for preventing this critical threat.

Read the full report.

 


 

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.

  • 56
  • 149418

PA-800 Series Datasheet

Palo Alto Networks PA-800 Series next-generation firewall appliances are designed to secure enterprise branch offices and midsized businesses.

  • 6
  • 36884

Protect Yourself From Antivirus

Traditional antivirus is not the solution to preventing endpoint breaches—it’s the problem. If you’re still using antivirus you are leaving your organization vulnerable to malicious attack.

Santa Clara, CA
  • 5
  • 19150

PA-5200 Series Datasheet

Key features, performance capacities and specifications for our PA-5200 Series.

  • 1
  • 34638

PA-220 Datasheet

Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices and retail locations.

  • 7
  • 32524

PA-3000 Series Specsheet

Key features, performance capacities and specifications of the Palo Alto Networks PA-3000 Series.

  • 14
  • 71464