Credential-Based Attacks: Executive Advisory Report

Credential theft is the oxygen of malicious activity: nearly always there, necessary, but never noticed. According to the 2016 Verizon® Data Breach Report, 63 percent of confirmed data breaches leveraged credentials, and the use of stolen credentials is the most common approach in web-app attacks. Credential theft is a staple in the playbooks of sophisticated attackers, like the Sofacy threat actor group, and unsophisticated attackers alike.


 

Product Summary Specsheet

Key features, performance capacities and specifications for all Palo Alto Networks firewalls.
  • 81
  • 219041

PA-5200 Series Datasheet

Key features, performance capacities and specifications for our PA-5200 Series.
  • 12
  • 73268

PA-800 Series Datasheet

Palo Alto Networks PA-800 Series next-generation firewall appliances are designed to secure enterprise branch offices and midsized businesses.
  • 12
  • 71120

PA-220 Datasheet

Palo Alto Networks PA-220 brings next-generation firewall capabilities to distributed enterprise branch offices and retail locations.
  • 16
  • 63252

VM-Series Specsheet

The VM-Series has been optimized and expanded to deliver industry-leading performance of up to 16Gbps of App-ID-enabled firewall throughput across five models.
  • 5
  • 49939

PA-3000 Series Specsheet

Key features, performance capacities and specifications of the Palo Alto Networks PA-3000 Series.
  • 20
  • 96947