Date

By Type

By Product Category

By Features

By Technologies

By Services

  • Education (1)

By Audience

By Language

Displaying 61 to 90 of 114

The Value of the Next-Generation Security Platform

See how the Next-Generation Security Platform has helped customers improve their security posture and reduce their total cost of ownership.
  • 3
  • 1515

EU Cybersecurity-Related Legislation:
Why Companies Should Care

How do companies in Europe manage cybersecurity risks? Get the Executive Advisory Report: European Union Cybersecurity-Related Legislation to find out.
  • 0
  • 3239

LogicMonitor

LogicMonitor’s automated SaaS performance monitoring platform provides IT Ops teams with end-to-end visibility and actionable metrics to manage infrastructures.
  • 0
  • 545

Best Practices in SaaS Security

Learn how Palo Alto Networks can help to secure SaaS applications so they don’t become a breeding ground for data leakage and malware.
  • 1
  • 1394

The Advantages of User Awareness in Public-sector Network Security

To serve their citizens, federal/national, state and local governments must gather, create, or process sensitive information. As various high-profile breaches have demonstrated, this data is not sufficiently protected, particularly from the insiders whose actions are responsible for the majority of public sector security incidents. Traditional network security focuses on detecting outsiders attempting to steal data or disrupt network operations, but does little to monitor or limit the actions of legitimate users that make mistakes or deliberately misuse data. User and directory controls verify legitimate users, but they won't prevent accidental disclosure of sensitive data, exfiltration of sensitive data by legitimate users, or insiders with stolen credentials from accessing data. Preventing security incidents and protecting government information requires a comprehensive, organization-wide access approach that can accommodate the context of individual users, the data they need access to, and the limits on what they can do with that data. The Palo Alto Networks Next-Generation Security Platform prevents security incidents while fully enabling user productivity by granting access contextually to those who need it, and denying it to all others. This, coupled with denying all applications that are not needed by the organization, immediately reduces a government organization’s threat posture.
  • 0
  • 596

3 Steps to Taking Control of SaaS Apps

When it comes to the use of software as a service (SaaS) applications within your organization, what you don’t know can hurt you. Like wolves in sheep’s clothing, unsanctioned or uncontrolled SaaS apps are probably sitting on your network right now, seemingly harmless and unobtrusive, enabling users to collaborate and do their jobs more productively. That is, until suddenly and without warning, they begin wreaking all sorts of havoc on your business, including data exposure, malware distribution and insertion, information leakage, and regulatory non-compliance.
  • 1
  • 995

NSS Labs 2016 NGFW Test Report

The 2016 NSS NGFW Product Analysis Report shows the Palo Alto Networks PA-7050 achieving a 95.8% security effectiveness rating and successfully passing all security tests.
  • 3
  • 13766

Best Practices: Inspecting Encrypted Traffic

This document outlines Palo Alto Networks methodology for selectively decrypting traffic and our best practices for balancing risk and user privacy.
  • 2
  • 1523

Selective SSL Decryption for Threat Prevention

This paper provides an approach to strike a balance between security and performance by selectively decrypting and inspecting SSL traffic based on policy.
  • 0
  • 7174

Governance of Cybersecurity 2015 Report

Palo Alto Networks joined Financial Services Roundtable and Forbes as sponsors of the Georgia Tech Governance of Cybersecurity: 2015 Report in order to increase the awareness among senior leaders on the importance of cybersecurity risk management and proper investments in the right people, process and technologies need to prevent cyber threats.
  • 0
  • 1833

APP-ID Tech Brief

This tech brief provides an overview of our patented App-ID classification technology that determines the exact identify of applications, irrespective of port, protocol, evasive tactic, or SSL encryption.
  • 4
  • 13947

Real-Time Cyberthreat Detection

Today our organizations remain highly vulnerable to modern cyberattacks, which have grown increasingly stealthy and persistent against traditional defenses. Serious incidents are not being detected in time, or at all, because security teams are either too dependent on narrow and outdated threat data, or they have no means to take action quickly, at scale, against all of the threat intelligence available to them
  • 0
  • 1975

Next-Generation Security Platform for Cable Operators

MSOs are complex, diverse businesses that combine lowmargin, high-capital cost services (e.g. basic TV, data and voice) with aggressive growth businesses. In some respects MSOs look like utilities, while in other respects they are high-growth, leading-edge technology services companies. MSOs are aggressively investing in growth strategies that leverage their unique access and relationships with subscribers and business customers.
  • 3
  • 352

The Next-Generation Security Platform for Service Providers

The Palo Alto Networks next-generation security platform enables service providers to address new challenges and opportunities — securing wireless and wireline infrastructure, enabling cloud services, NFV/SDN and delivering managed security services. - Read the Platform Brief
  • 1
  • 469

Next-Generation Security Platform for the Manufacturing Industry

From cookies and kettles to cars and commercial jets, the manufacturing industry produces goods for consumers, enterprises, and industrial applications. To improve efficiency and get quality products into the hands of customers sooner, manufacturers must communicate effectively with suppliers, partners, and service providers, and ensure the integrity of the manufacturing plant and processes. The Palo Alto Networks Next-Generation Security Platform provides the scalability and performance needed to address the most diverse and complex network demands with the security and visibility required to stand up to today’s threat landscape.
  • 0
  • 235

CONTENT-ID Tech Brief

Overview of our technology that delivers real-time threat prevention and content control.
  • 2
  • 6233

Applying Zero Trust To The Extended Enterprise

Learn how to apply the Forrester Research Zero Trust in your enterprise using next-generation firewalls.
  • 0
  • 666

DNS Protection Technology Brief

A two-page technology brief on how the Palo Alto Networks next-generation security platform protects DNS traffic from malware and related malicious activity.
  • 0
  • 4486

Managed Security Services Solution Brief

Demand for managed security services is on the rise as many enterprises and governments struggle to contend with an increasingly complex threat landscape, a shortage of skilled personnel, and the need to rapidly adapt to dynamic business conditions while still keeping security costs under control.
  • 1
  • 4355

Palo Alto Networks and Garland Technology Partnership

When customers deploy inline appliances on mission critical network segments, they have the option to mitigate the risks of scheduled or unscheduled downtime of an inline appliance for configuration changes, maintenance, or repair scenarios by adding a tap/bypass switch to maintain network continuity. Palo Alto Networks has partnered with Garland Technology to provide the ability to install Palo Alto Networks next-generation firewall inline without compromising network uptime.
  • 0
  • 478

Palo Alto Networks and Interface Masters Partnership

On mission critical network segments, customers may prefer to deploy a tap/bypass switch to maintain network continuity to mitigate the risks of scheduled or unscheduled downtime of an inline appliance for configuration changes, maintenance, or repair.
  • 0
  • 391

Palo Alto Networks and Gigamon

Palo Alto Networks and Gigamon have partnered to deliver a highly reliable and transparent threat prevention solution. In a high-availability environment, the loss of a single device or power source cannot be allowed to jeopardize network connectivity. The addition of a network security device to protect the network cannot introduce any single points of failure. The combination of the Palo Alto Networks next-generation firewall with GigaVUE bypass functionality provides full threat prevention, transparently and with no reduction in reliability.
  • 0
  • 1654

Palo Alto Networks and Tufin

As organizations deploy multiple security solutions to safeguard corporate networks from wide-ranging threats, it becomes increasingly difficult to perform labor-intensive and error-prone tasks such as risk analysis, change management, auditing and compliance checks. Palo Alto Networks and Tufin® have partnered to help customers increase operational efficiency and reduce risk by intelligently automating firewall policy management.
  • 0
  • 1551

Palo Alto Networks and Enterasys Partnership

Enterprise Mobility and BYOD trends are causing significant disruption to traditional network security practices. The growth and diversity of mobile device usage combined with the requirement of anytime, anywhere access to applications and data, has presented significant operational challenges and security risk to the IT organization. Typical legacy enterprise LAN infrastructures were not architected with adequate management, visibility, and awareness necessary to adapt to today’s application security and mobile provisioning requirements.
  • 0
  • 411

Palo Alto Networks and Plixer

Performance and accountability of Enterprise IT infrastructure has shifted from an incidental focus to real-time visibility for proactive monitoring and compliance mandates. Network security devices have traditionally posed a blind spot for network monitoring and management solutions by typically restricting output to basic network parameters such as NAT tables and traffic session. Palo Alto Networks breaks this barrier by providing unprecedented visibility of user and application usage information via Netflow, the industry standard protocol for network monitoring. Plixer’s™ Scrutinizer software collects and analyzes Netflow data to monitor and report on overall health of the network.
  • 0
  • 454

Palo Alto Networks and NetWitness

Palo Alto Networks and NetWitness have partnered to provide unified security event analysis and resolution. The combined solution validates application execution, speeds incident investigation and eliminates wasted time navigating disparate systems.
  • 0
  • 444

Assuming a Platform Approach to Cybersecurity

Pamela Warren, Director of Government and Industry Initiatives at Palo Alto Networks, shares her thoughts on why a platform approach is critical to effective cybersecurity within the government space. Warren explains that government organizations make four common mistakes when trying to secure their information systems. The most basic error, she said, is failing to have visibility to what is happening on your network: "What we're seeing is that many organizations are unaware of what applications they are even running on their network." This ends up being a major barrier to effective cybersecurity because it leaves unseen gaps in security for attackers to target.
  • 0
  • 379

Palo Alto Networks and Avaya Partnership

Palo Alto Networks and Avaya™ have partnered to provide high-performance next-generation security solutions for data center networks. The mission critical data centers of today have no tolerance for disruptions in throughput or availability. At the same time, the threats imposed on data centers by modern malware require a security solution that has next-generation firewall intelligence.
  • 0
  • 1595

Palo Alto Networks and MobileIron

Intelligent tablets and smartphones are now the primary personal communications and computing platform for Mobile IT business operations and apps. As a result, IT needs to consider how to provide secure network access to both enterprise and end user owned mobile devices. Moreover, an exponential increase in the number and usage of mobile apps is creating new threat vectors that must be addressed by IT to safeguard mobile devices and prevent data loss.
  • 0
  • 1523

Security Platform for Healthcare Providers

Palo Alto Networks® enterprise security platform is well suited for healthcare providers. Our ability to provide full visibility into all network traffic based on application (App-ID™), users (User-ID™) and content (Content-ID™) enables your security staff to rapidly assess the current state of your information and network security without any disruption to daily operations. You can discover where the organization is most at risk and make informed decisions about where to implement tighter controls. This Solution Brief available in Italian, Portuguese, and Spanish.
  • 7
  • 1858
Displaying 61 to 90 of 114