Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government
Read More
Persistent Attempts at Cyberespionage Against Southeast Asian Government Target Have Links to Alloy Taurus
Read More
Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda
Read More
Sign In
Customer
Partner
Employee
Research
Create Account
EN
Get Started
Contact Us
Resources
Get support
Under Attack?
Products
Solutions
Services
Partners
Company
More
Sign In
Sign In
Customer
Partner
Employee
Research
Create Account
EN
Language
Get Started
Contact Us
Resources
Get support
Under Attack?
Unit 42 Threat Research
Palo Alto Networks: Resource Center SASE Resources
Stay informed by accessing our wide range of the latest SASE resources, including infographics, blogs, videos, case studies and more.
Explore Secure Access Service Edge Resources
CLEAR
Filters
Filtered by:
CLEAR ALL
Date
Start date
End date
Search by date
Last week
Last 30 days
Last 6 months
Last year
Topic
Secure Access Service Edge (SASE) (
173
)
Cloud Security (
68
)
Network Security (
64
)
Zero Trust (
29
)
Secure Remote Workforce (
19
)
Network Security Management (
19
)
Security Operating Platform (
18
)
Saas Security (
17
)
Mobile Security (
17
)
Security Operations (
13
)
Security Ecosystem (
12
)
Remote Workforce (
10
)
Threat Detection and Prevention (
10
)
Public Cloud Security (
9
)
Private Cloud Security (
9
)
Microsoft Azure (
5
)
Professional Services (
4
)
Google Cloud (
4
)
Microsoft Hyper-V (
3
)
Attack Surface Management (
3
)
Amazon Web Services (
3
)
Data Center (
2
)
KVM (
1
)
Cybersecurity Fundamentals (
1
)
VMWare NSX (
1
)
+ Show More
Industry
Healthcare (
17
)
Financial Services (
17
)
Manufacturing (
12
)
Retail (
9
)
Federal Government (
8
)
State & Local Government (
5
)
Other Industries (
5
)
Technology (
3
)
Utilities & Energy (
2
)
Service Provider & Telecommunications (
2
)
ICS SCADA (
1
)
IoT (
1
)
Professional & Legal Services (
1
)
+ Show More
Products
Prisma Access (
195
)
Prisma SD-WAN (
125
)
Prisma SASE (
87
)
NGFW (
46
)
Prisma Cloud (
27
)
PA-Series (
23
)
VM-Series (
19
)
Panorama (
19
)
GlobalProtect (
18
)
Cortex XDR (
16
)
Cortex XSOAR (
14
)
Threat Prevention (
14
)
URL Filtering (
13
)
WildFire (
13
)
SaaS Security (
13
)
Cortex (
12
)
Zero Trust (
8
)
IoT Security (
7
)
Cortex Xpanse (
7
)
DNS Security service (
6
)
Enterprise DLP (
5
)
Advanced Threat Prevention (
4
)
Cortex Data Lake (
4
)
Threat Intel Management (
4
)
Unit 42 (
3
)
CN Series (
3
)
Cortex XSIAM (
2
)
Cloud NGFW (
2
)
PAN-OS 10.0 (
1
)
+ Show More
Services
Professional Services (
1
)
Proactive Assessments (
1
)
Support Services (
1
)
Focussed Services (
1
)
Incident Response (
1
)
Educational and Professional Services
Professional Services (
5
)
Support (
2
)
Training (
2
)
Transformation Services (
1
)
Certified Partners (
1
)
Cybersecurity Academy (
1
)
Customer Success (
1
)
+ Show More
Type
Customer Story (
51
)
Article (
34
)
White Paper (
30
)
Datasheet (
30
)
Video (
27
)
Use Case (
18
)
Webinar (
17
)
Research Reports (
17
)
Book (
13
)
Guide (
11
)
Infographic (
7
)
Other (
6
)
Presentations (
1
)
+ Show More
Don't see what you're looking for? Check out the Resource Center.
Browse all resources
Results
Don't see what you're looking for? Check out the Resource Center.
Browse all resources
Displaying
307–324
of
356
Results
Sort by
newest
Relevance
Newest
Oldest
Trending
Video
Securing Branch Offices with Prisma
Watch the video
Webinar
Is security the #1 obstacle in your journey to the cloud?
Watch the video
Video
Top 10 Prisma Security Best Practices for Azure
Watch the video
Whitepaper
Best practices and guides for complete cloud security
Download the whitepaper
Video
Cloud-Based Security Infrastructure Video
Watch the video
Video
Prisma Access (formerly GlobalProtect cloud service) - EDU 118
Watch the video
Video
Prisma Access Cloud Service
Watch the video
Article
SD-WAN vs. SASE: What’s the Difference?
Read the story
Article
What Is a Proxy Server?
Read the story
Article
What Is the CI/CD Pipeline?
Read the story
Article
What is the Difference Between SD-WAN and MPLS?
Read the story
Article
What Is Next-Generation SD-WAN?
Read the story
Article
What Is SASE?
Read the story
Article
What is Attack Surface Management ?
Read the story
Article
What Is SD-WAN?
Read the story
Article
What Is Policy-as-Code?
Read the story
Article
What Is Least Privilege Access?
Read the story
Article
What Is Web Application and API Protection?
Read the story
1
2
…
17
18
19
20