• Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence

SD-WAN and SASE: How Do They Relate?

Many companies use SD-WAN to securely connect branch offices to their corporate networks instead of relying on traditional MPLS connections
See more

How Zero Trust and SASE Can Work Together

By combining SASE and Zero Trust principles, companies can achieve ZTNA with a single solution to apply security policies across their network.
See more

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
By Topic

By Topic

  • Secure Access Service Edge (SASE)  (170)
  • Cloud Security (73)
  • Network Security (62)
  • Zero Trust (26)
  • Saas Security (20)
  • Network Security Management (20)
  • Secure Remote Workforce (18)
  • Mobile Security (17)
  • Security Operating Platform (16)
  • Security Operations (13)
  • Security Ecosystem (12)
  • Remote Workforce (10)
  • Threat Detection and Prevention (10)
  • Private Cloud Security (10)
  • Public Cloud Security (9)
  • Amazon Web Services (8)
  • Google Cloud (5)
  • Microsoft Azure (5)
  • Microsoft Hyper-V (3)
  • Professional Services (3)
  • Attack Surface Management (3)
  • Data Center (2)
  • FedRAMP (1)
  • KVM (1)
  • Cybersecurity Fundamentals (1)
  • VMWare NSX (1)
  • CC FIPS (1)
  • + Show More
By Industry

By Industry

  • Financial Services (14)
  • Healthcare (11)
  • Manufacturing (10)
  • Retail (9)
  • Federal Government (6)
  • Other Industries (4)
  • Energy (3)
  • State & Local Government (3)
  • Media & Entertainment (3)
  • Higher Education (3)
  • Utilities & Energy (2)
  • Technology (2)
  • K-12 Education (2)
  • Automotive (1)
  • ICS SCADA (1)
  • Service Provider & Telecommunications (1)
  • Professional & Legal Services (1)
  • High Technology (1)
  • + Show More
By Type

By Type

  • Customer Story (38)
  • Article (34)
  • White Paper (31)
  • Datasheet (29)
  • Video (26)
  • Webinar (17)
  • Research Reports (17)
  • Use Case (13)
  • Book (12)
  • Guide (12)
  • Infographic (6)
  • Other (5)
  • + Show More
By Product Category

By Product Category

  • Prisma Access (180)
  • Prisma SD-WAN (116)
  • Prisma SASE (74)
  • NGFW (36)
  • Prisma Cloud (25)
  • PA-Series (21)
  • VM-Series (20)
  • Cortex XDR (15)
  • Panorama (15)
  • GlobalProtect (14)
  • Cortex XSOAR (13)
  • SaaS Security (13)
  • Cortex (12)
  • URL Filtering (11)
  • Threat Prevention (11)
  • WildFire (9)
  • IoT Security (7)
  • Cortex Xpanse (6)
  • DNS Security service (5)
  • Zero Trust (5)
  • Threat Intel Management (5)
  • Cortex Data Lake (4)
  • Enterprise DLP (4)
  • Advanced Threat Prevention (3)
  • Unit 42 (3)
  • CN Series (3)
  • Cortex XSIAM (2)
  • Cloud NGFW (2)
  • PAN-OS 10.0 (1)
  • + Show More
Education and Professional Services

Education and Professional Services

  • Professional Services (5)
  • Support (2)
  • Training (2)
  • Transformation Services (1)
  • Certified Partners (1)
  • Cybersecurity Academy (1)
  • Customer Success (1)
Displaying 1 - 30 of 337
Pagination
  • 1
  • 2
  • …
  • 11
  • 12

Article

What is Attack Surface Management ?

Attack Surface Management (ASM) is based on the understanding that you cannot secure what you don’t know about
March 28, 2023

Article

Why Machine Learning (ML) and Artificial Intelligence (AI) Are Key Technologies for SD-WAN

SD-WAN that includes machine learning and artificial intelligence amplifies network visibility and simplifies both network troubleshooting and operations.
March 28, 2023

Article

Secure Access Service Edge (SASE) Key Requirements

A secure access service edge (SASE) brings together networking and network security services in a single cloud-based platform
March 28, 2023

Article

Replacing Legacy VPN and NAC Solutions with a Next-Generation Network Security Client for Endpoints

In today’s times, legacy VPN and NAC solutions fall short when it comes to providing advanced protection for mobile workforces and corporate networks
March 28, 2023

Article

What is Secure Web Gateway (SWG)?

A secure web gateway (SWG) protects users from web-based threats in addition to applying and enforcing corporate acceptable use policies.
March 28, 2023

Article

VPN Alternatives for Remote Access

VPNs fall short in protecting the remote workforce. Learn about the shortcomings of VPN solutions and alternative solutions that offer better benefits.
March 28, 2023

Article

How Does SD-WAN Automation Simplify Network Operations?

Integrating your SD-WAN with powerful DevOps frameworks delivers agility, repeatability, accuracy and automation, thereby simplifying operations.
March 28, 2023

Article

Top 5 Requirements for Securing Your Branch Offices

Securing your branch office is crucial to protect your organization’s data and employees as well as ensure your organization does not suffer a breach.
March 28, 2023

Article

Branch Network Security | Securing Branch Networks with SD-WAN

Branch network security safeguards branch offices using SD-WAN to ensure they are protected from cyberthreats. Learn how SD-WANs protect branch networks.
March 28, 2023

Article

What is Remote Access?

Remote access provides end users with the ability to access resources on the corporate network from a distant location.
March 28, 2023

Article

What Is a Proxy Server

A proxy server is a dedicated computer or a software system that sits between end user devices and a desired destination.
March 28, 2023

Article

What is a VPN?

A virtual private network (VPN) allows you to safely connect to another network over the internet by encrypting the connection from your device.
March 28, 2023

Article

What Is a Site-to-Site VPN?

A site-to-site virtual private network (VPN) is a connection between two or more networks, such as a corporate network and a branch office network.
March 28, 2023

Article

What Is SD-Branch | Centralized Security for Branch Office Networks

SD-Branch provides software-defined solutions to branch offices, proving centralized security for branch office networks.
March 28, 2023

Article

What Is a Business VPN? Understand Its Uses and Limitations

A business VPN provides secure remote access to internal networks which remote employees can use while they work from home. Learn about the uses and limitations of VPNs.
March 28, 2023

Article

What Is Least Privilege Access?

A basic best practice when configuring roles and permissions for any software environment is to apply least privilege access.
March 28, 2023

Article

What Is the CI/CD Pipeline and CI/CD Security?

The CI/CD pipeline is a foundational part of DevOps.
March 28, 2023

Article

MPLS | What Is Multiprotocol Label Switching

MPLS, or Multiprotocol Label Switching, is a networking technology that routes traffic using the shortest path based on “labels” to handle forwarding.
March 28, 2023

Article

What Is a Container?

Starting with the advent of Docker in 2013, containers have become a fundamental building-block of modern IT infrastructure.
March 28, 2023

Article

What Is Policy-as-Code?

Policy-as-code is an approach to policy management in which policies are defined, updated, shared, and enforced using code.
March 28, 2023

Article

What Is Web Application and API Protection?

Web application and API (Application Program Interfaces) protection is a set of development, integration, and deployment practices that reduces the exposure to known vulnerabilities and denial-of-service attacks.
March 28, 2023

Article

What Is SASE?

Secure access service edge, or SASE (pronounced “sassy”), is an emerging cybersecurity concept. It is the convergence of wide area networking.
March 28, 2023

Article

What is the cloud-delivered branch?

Simplify the connectivity and protection of branch offices with a cloud solution.
March 28, 2023

Article

What Is SD-WAN?

A software-defined wide area network (SD-WAN) is a virtually configured service that connects data centers to branches and cloud.
March 28, 2023

Article

SD-WAN vs MPLS

Learn how software-defined wide area networks (SD-WANs) differs from Multiprotocol Label Switching (MPLS) to help you when evaluating different solutions.
March 28, 2023

Article

What Is Next-Generation SD-WAN?

As the industry moves from MPLS to SD-WAN and beyond, learn the risks of legacy SD-WAN and the need for next-generation SD-WAN.
March 28, 2023

Article

What is AIOps

AIOps is short for artificial intelligence to IT operations, that aims to simplify and accelerate IT operations management.
March 28, 2023

Article

SD-WAN and SASE: How Do They Relate?

Many companies use SD-WAN to securely connect branch offices to their corporate networks instead of relying on traditional MPLS connections
March 28, 2023

Article

What Is SSE? | Security Service Edge (SSE)

The security service edge (SSE) includes integrated, cloud-centric capabilities for safe access to websites, SaaS applications, and private applications.
March 28, 2023

Article

How Zero Trust and SASE Can Work Together

By combining SASE and Zero Trust principles, companies can achieve ZTNA with a single solution to apply security policies across their network.
March 28, 2023
Displaying 1 - 30 of 337
Pagination Bottom
  • 1
  • 2
  • …
  • 11
  • 12

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved