Date

By Type

By Product Category

By Features

By Technologies

By Services

  • Education (1)

By Audience

By Language

Displaying 31 to 60 of 114

Deployment Guide for Microsoft Exchange 2010

Securing and Accelerating Microsoft Exchange with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution
  • 0
  • 262

Citrix Mobile Device Management

Palo Alto Networks and Citrix Partnership.
  • 0
  • 111

Securing SD-WAN with the Palo Alto Networks Next-Generation Security Platform

Palo Alto Networks provides security for SD-WAN.
  • 0
  • 3107

Palo Alto Networks & Vectra Networks

Palo Alto Networks and Vectra Networks provide our customers with increased visibility and synchronized protection to effectively combat today’s advanced threats.
  • 0
  • 649

Safe Networking Framework

Download the brief now to learn more about this simple, cost-effective approach that can quickly improve MSSP security posture with customers and provide new revenue possibilities.
  • 1
  • 439

Palo Alto Networks & Centrify

Read this brief to learn how to protect user credentials with Palo Alto Networks and Centrify.
  • 0
  • 420

Palo Alto Networks and RSA

Learn how RSA and Palo Alto Networks have collaborated to simplify the deployment of multi-factor authentication.
  • 0
  • 2201

Cybersecurity Academy

Learn about the Palo Alto Networks Cybersecurity Academy Program
  • 0
  • 1316

Palo Alto Networks and the E-Rate Program

Read this brochure for an overview of Palo Alto Networks E-rate eligible products and services, and why K-12 schools and districts choose Palo Alto Networks to protect students across all their digital engagements, from endpoints to the network to the cloud.
  • 0
  • 329

HIMSS - Healthcare IT Cybersecurity Study

Email/phishing attacks are a major concern at healthcare organizations with Austria, Germany, Netherlands, Switzerland, United States, and Nordic countries all listing it as the greatest area of vulnerability U.S. respondents feel the most prepared to stop cyber-attacks on the network, and least prepared to stop cyber-attacks on unmanaged endpoints Endpoint and medical devices protection are top of mind with 72.1% stating that deploying effective advance endpoint protection to stop malware like ransomware, 38% are looking for effective exploit kit protection for endpoints and 54% are looking for medical devices protection. U.S. hospitals report being attacked by cybercriminals (89.5%) nearly two times more frequently than the next nearest country (Germany – 46.0%) over the last 12 months
  • 1
  • 252

Continuous Diagnostics and Mitigation

The U.S. Government’s Continuous Diagnostics and Mitigation (CDM) program “support(s) … government-wide and agency-specific efforts to provide adequate, risk-based, and cost-effective cybersecurity.” The CDM program is designed to roll out in three phases. This white paper describes how the Palo Alto Networks Next-Generation Security Platform, in combination with select technology and delivery partners, supports all three CDM phases and enables agencies to achieve the security objectives of the program.
  • 0
  • 5722

Next-Generation Security for Automotive Environments

Read this summary of our prevention-based approach to protect the automotive networks from cyberattacks.
  • 0
  • 413

Navigating the Digital Age

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials.
  • 1
  • 1188

Navigating the Digital Age (Benelux Edition)

Navigating the Digital Age (Benelux Edition) includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials.
  • 1
  • 377

Three Questions to Ask Your CIO About Public Cloud Security

If your CIO has been planning ahead, you probably have a plan for secure collaboration with public cloud service providers. But if not, ask why not.
  • 0
  • 225

Navigating the Digital Age for Australia

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials for Australia.
  • 0
  • 218

Navigating the Digital Age for the United Kingdom

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials for the UK.
  • 0
  • 366

Navigating the Digital Age for Singapore

Navigating the Digital Age includes advice and cybersecurity best practices from CEOs, CISOs, lawyers, consultants and former government officials for Singapore.
  • 0
  • 286

Navigating the Digital Age for France

La nouvelle législation de l'Union Européenne autour de la directive SRI et de la réforme de la protection des données progresse.
  • 0
  • 244

Comparing Palo Alto Networks With Proxy-Based Products

Comparison of Palo Alto Networks next-generation firewall technology with proxies.
  • 1
  • 25728

Next-Generation Security Platform for the Pharmaceutical Industry

From pain medication to gene therapy, from clinical trials to regulatory approval, the modern pharmaceutical industry is built on research and information flow. Ensuring both the integrity of data in pharmaceutical operations as well as the protection of the resulting intellectual property are equally important to success. The safety and integrity of plant operations are equally vital to the company’s success. Effectively protecting the IT and OT networks in today’s broad-reaching pharmaceutical networks requires a modernized security approach. The Palo Alto Networks Next-Generation Security Platform is the solution of choice for many modern pharmaceutical companies.
  • 1
  • 431

Palo Alto Networks & Ecessa

Ecessa and Palo Alto Networks customers can capitalize on unprecedented protection against today’s sophisticated attacks for superior network performance.
  • 0
  • 189

8 Imperatives for Governments to Defeat Advanced Threats

Advanced attacks are organized campaigns that leverage multiple techniques. Don’t be the government organization flying blind to attacks against your organization.
  • 0
  • 317

At a Glance Automated Correlation Engine

Palo Alto Networks Automated Correlation Engine continuously scrutinizes firewall events and correlates indicators of compromise on your network.
  • 0
  • 1007

Replacing Traditional Remote Access VPN With GlobalProtect

This solution brief provides an overview for using GlobalProtect as remote access VPN.
  • 1
  • 8446

Auto Scaling the VM-Series on AWS Tech Brief

One of the core Amazon® Web Services (AWS®) values is the ability to scale your applications dynamically as traffic demands dictate. AWS Elastic Load Balancing (AWS ELB) and AWS Auto Scaling allow you to add new resources, such as a web server, to your AWS VPC based on observed, increased traffic.
  • 0
  • 83

Safely Enable Your SaaS Applications

The use of SaaS applications is creating gaps in security visibility and new risks for threat propagation, data leakage and regulatory noncompliance. See how Aperture can help.
  • 1
  • 12709

Neutralizing Credential Theft and Abuse

Find out why the best practices for passwords aren’t always effective, and what you can do to protect your data and users from phishing and credentials-based attacks.
  • 0
  • 701

VMware NSX With Next-Generation Security From Palo Alto Networks

While organizations have gained operational flexibility and lowered data center costs by deploying virtualization solutions, the true promise of a secure, agile, extensible, and flexible private cloud continues to be elusive. One of the key barriers is the ability to deploy security services at the same pace as virtual machine deployments without compromising the level of protection needed. VMware and Palo Alto Networks have partnered to address these challenges.
  • 3
  • 12217

AirWatch Palo Alto Networks Integration Solution Brief

Read how Palo Alto Networks and AirWatch have partnered to provide unique, integrated security for protecting the mobile workforce.
  • 0
  • 230
Displaying 31 to 60 of 114