Date

By Type

By Product Category

By Features

By Technologies

By Services

  • Education (1)

By Audience

By Language

Displaying 61 to 90 of 111

The Advantages of User Awareness in Public-sector Network Security

To serve their citizens, federal/national, state and local governments must gather, create, or process sensitive information. As various high-profile breaches have demonstrated, this data is not sufficiently protected, particularly from the insiders whose actions are responsible for the majority of public sector security incidents. Traditional network security focuses on detecting outsiders attempting to steal data or disrupt network operations, but does little to monitor or limit the actions of legitimate users that make mistakes or deliberately misuse data. User and directory controls verify legitimate users, but they won't prevent accidental disclosure of sensitive data, exfiltration of sensitive data by legitimate users, or insiders with stolen credentials from accessing data. Preventing security incidents and protecting government information requires a comprehensive, organization-wide access approach that can accommodate the context of individual users, the data they need access to, and the limits on what they can do with that data. The Palo Alto Networks Next-Generation Security Platform prevents security incidents while fully enabling user productivity by granting access contextually to those who need it, and denying it to all others. This, coupled with denying all applications that are not needed by the organization, immediately reduces a government organization’s threat posture.
  • 0
  • 517

3 Steps to Taking Control of SaaS Apps

When it comes to the use of software as a service (SaaS) applications within your organization, what you don’t know can hurt you. Like wolves in sheep’s clothing, unsanctioned or uncontrolled SaaS apps are probably sitting on your network right now, seemingly harmless and unobtrusive, enabling users to collaborate and do their jobs more productively. That is, until suddenly and without warning, they begin wreaking all sorts of havoc on your business, including data exposure, malware distribution and insertion, information leakage, and regulatory non-compliance.
  • 1
  • 894

NSS Labs 2016 NGFW Test Report

The 2016 NSS NGFW Product Analysis Report shows the Palo Alto Networks PA-7050 achieving a 95.8% security effectiveness rating and successfully passing all security tests.
  • 3
  • 13613

Best Practices: Inspecting Encrypted Traffic

This document outlines Palo Alto Networks methodology for selectively decrypting traffic and our best practices for balancing risk and user privacy.
  • 2
  • 1390

Selective SSL Decryption for Threat Prevention

This paper provides an approach to strike a balance between security and performance by selectively decrypting and inspecting SSL traffic based on policy.
  • 0
  • 6775

Governance of Cybersecurity 2015 Report

Palo Alto Networks joined Financial Services Roundtable and Forbes as sponsors of the Georgia Tech Governance of Cybersecurity: 2015 Report in order to increase the awareness among senior leaders on the importance of cybersecurity risk management and proper investments in the right people, process and technologies need to prevent cyber threats.
  • 0
  • 1762

APP-ID Tech Brief

This tech brief provides an overview of our patented App-ID classification technology that determines the exact identify of applications, irrespective of port, protocol, evasive tactic, or SSL encryption.
  • 4
  • 12715

Real-Time Cyberthreat Detection

Today our organizations remain highly vulnerable to modern cyberattacks, which have grown increasingly stealthy and persistent against traditional defenses. Serious incidents are not being detected in time, or at all, because security teams are either too dependent on narrow and outdated threat data, or they have no means to take action quickly, at scale, against all of the threat intelligence available to them
  • 0
  • 1746

Cybersecurity Survival Guide

Next-generation implies that new methods of processing and securing network traffic are being used to provide visibility and control over traffic, applications, and threats. Enterprise security deals with threat protection for large and complex organizations; while cybersecurity scales the vast landscape of the Internet riddled with vulnerabilities and viruses.
  • 2
  • 800

Next-Generation Security Platform for Cable Operators

MSOs are complex, diverse businesses that combine lowmargin, high-capital cost services (e.g. basic TV, data and voice) with aggressive growth businesses. In some respects MSOs look like utilities, while in other respects they are high-growth, leading-edge technology services companies. MSOs are aggressively investing in growth strategies that leverage their unique access and relationships with subscribers and business customers.
  • 3
  • 303

The Next-Generation Security Platform for Service Providers

The Palo Alto Networks next-generation security platform enables service providers to address new challenges and opportunities — securing wireless and wireline infrastructure, enabling cloud services, NFV/SDN and delivering managed security services. - Read the Platform Brief
  • 1
  • 415

Next-Generation Security Platform for the Manufacturing Industry

From cookies and kettles to cars and commercial jets, the manufacturing industry produces goods for consumers, enterprises, and industrial applications. To improve efficiency and get quality products into the hands of customers sooner, manufacturers must communicate effectively with suppliers, partners, and service providers, and ensure the integrity of the manufacturing plant and processes. The Palo Alto Networks Next-Generation Security Platform provides the scalability and performance needed to address the most diverse and complex network demands with the security and visibility required to stand up to today’s threat landscape.
  • 0
  • 180

CONTENT-ID Tech Brief

Overview of our technology that delivers real-time threat prevention and content control.
  • 2
  • 5659

Applying Zero Trust To The Extended Enterprise

Learn how to apply the Forrester Research Zero Trust in your enterprise using next-generation firewalls.
  • 0
  • 610

DNS Protection Technology Brief

A two-page technology brief on how the Palo Alto Networks next-generation security platform protects DNS traffic from malware and related malicious activity.
  • 0
  • 4043

Network Segmentation Solution Brief

Organizations require a network security platform capable of creating relevant security policies by application, user and content for all of their network segments. Learn more about the need for effective network segmentation, and how a Palo Alto Networks security platform can be at the center of any segmented network.
  • 1
  • 1946

Managed Security Services Solution Brief

Demand for managed security services is on the rise as many enterprises and governments struggle to contend with an increasingly complex threat landscape, a shortage of skilled personnel, and the need to rapidly adapt to dynamic business conditions while still keeping security costs under control.
  • 1
  • 4186

Palo Alto Networks and NetWitness

Palo Alto Networks and NetWitness have partnered to provide unified security event analysis and resolution. The combined solution validates application execution, speeds incident investigation and eliminates wasted time navigating disparate systems.
  • 0
  • 355

Palo Alto Networks and SafeNet

As more and more daily business practices are conducted online, organizations face a growing challenge of ensuring that only authorized users may carry out transactions and access its most sensitive online resources. Moreover, businesses must protect access to network and web-based applications amid a rapidly changing security landscape of complex identity management—especially resulting from proliferation of mobile devices. Palo Alto Networks is partnering with SafeNet to provide a multi-factor authentication solution to protect user identities.
  • 0
  • 519

Verizon and Palo Alto Networks: Partnering for True Next-Generation Security Solutions

Verizon and Palo Networks have partnered to offer you the most advanced security technology combined with world-leading managed services.
  • 0
  • 1046

Palo Alto Networks and Citrix Partnership

The number of smartphones and tablets accessing data on the corporate networks is exploding. Some of these devices are enterprise owned, while many others are user owned. The new IT challenge deals with balancing security with end-user freedom, particularly on personally owned devices. These challenges intensify when considering the increasing demand for application and data access on smartphones and tablets. These devices and apps create new threat vectors that must be addressed by IT executives to prevent data leakage of sensitive corporate information.
  • 0
  • 244

Palo Alto Networks and Aruba Networks

Aruba Networks and Palo Alto Networks have partnered to provide best of class content security for guest and employee owned mobile devices that are now commonplace on enterprise networks. With the certified solution, enterprise IT departments can now securely enable Bring Your Own Device and Guest Access initiatives, while maintaining compliance. Aruba’s Wi-Fi network and Palo Alto Networks’ next-generation firewalls share user, device and application information to monitor and enforce application usage policies on smartphones, tablets and laptops.
  • 0
  • 5739

Palo Alto Networks and Nordic Edge

Palo Alto Networks and Nordic Edge have partnered to deliver a variety of different easy-to-use, reliable, and strong authentication methods.
  • 0
  • 476

Palo Alto Networks and Network Critical

Learn how the Network Critical’s tap/bypass switch optimizes full-functionality of the Next-Generation Firewall without impacting latency or availability.
  • 0
  • 436

Palo Alto Networks and Enterasys Partnership

Enterprise Mobility and BYOD trends are causing significant disruption to traditional network security practices. The growth and diversity of mobile device usage combined with the requirement of anytime, anywhere access to applications and data, has presented significant operational challenges and security risk to the IT organization. Typical legacy enterprise LAN infrastructures were not architected with adequate management, visibility, and awareness necessary to adapt to today’s application security and mobile provisioning requirements.
  • 0
  • 346

Palo Alto Networks and MobileIron

Intelligent tablets and smartphones are now the primary personal communications and computing platform for Mobile IT business operations and apps. As a result, IT needs to consider how to provide secure network access to both enterprise and end user owned mobile devices. Moreover, an exponential increase in the number and usage of mobile apps is creating new threat vectors that must be addressed by IT to safeguard mobile devices and prevent data loss.
  • 0
  • 1374

User-ID Tech Brief

Overview of our User-ID technology that can gather user identity from multiple sources including VPNs, WLAN controllers, captive portals, directory servers, proxies and more.
  • 3
  • 6236

Palo Alto Networks and Lancope

Performance and accountability of enterprise IT infrastructure has shifted from an incidental focus to one that requires real-time visibility for proactive monitoring and compliance. Traditional network security devices posed a blind spot for network monitoring and management solutions for basic network parameters such as NAT tables and traffic sessions.
  • 0
  • 569

Palo Alto Networks and Gigamon

Palo Alto Networks and Gigamon have partnered to deliver a highly reliable and transparent threat prevention solution. In a high-availability environment, the loss of a single device or power source cannot be allowed to jeopardize network connectivity. The addition of a network security device to protect the network cannot introduce any single points of failure. The combination of the Palo Alto Networks next-generation firewall with GigaVUE bypass functionality provides full threat prevention, transparently and with no reduction in reliability.
  • 0
  • 1493

Palo Alto Networks and Garland Technology Partnership

When customers deploy inline appliances on mission critical network segments, they have the option to mitigate the risks of scheduled or unscheduled downtime of an inline appliance for configuration changes, maintenance, or repair scenarios by adding a tap/bypass switch to maintain network continuity. Palo Alto Networks has partnered with Garland Technology to provide the ability to install Palo Alto Networks next-generation firewall inline without compromising network uptime.
  • 0
  • 402
Displaying 61 to 90 of 111