Unit 42 Attack Surface Threat Research: Over 23% of Internet-Connected Exposures Involve Critical IT and Security Infrastructure
ArtiPACKED: Hacking Giants Through a Race Condition in GitHub Actions Artifacts
Harnessing LLMs for Automating BOLA Detection
  • Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get Support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Research
Webinar

Unit 42 by Palo Alto Networks

Feb 04, 2022

Unit 42® brings together world-renowned threat researchers with an elite team of security consultants to create an intelligence-driven, response-ready organization. As threats escalate, Unit 42 is available to advise federal agencies on the latest risks, assess their readiness and help them recover when the worst occurs.

Whether responding to a breach or managing cyber risk, Palo Alto Networks understands your challenges. Hailing from U.S. government agencies, law enforcement and global security firms, Unit 42 security consultants have handled some of the largest data breaches in history. Everything we do, from deployment to analysis and delivery of findings, is built for speed. We activate our Incident Response teams within minutes, integrating the specialized skill sets needed—from forensic consultants to malware analysts and team leaders. We move quickly to contain, investigate and coordinate our response. And, we work with you to find the facts and maneuver through the critical decisions that get you back to business fast.

View the webinar replay to take a deeper dive into Unit 42 and its service offerings, including:

  • Incident response: Ransomware investigation, business email compromise, cloud incident response, advanced persistent threats and web application attacks
  • Digital forensics: Digital investigation, insider threat investigation and structured data investigation
  • Proactive assessments: Ransomware Readiness Assessment, Cyber Risk Assessment, Compromise Assessment, Red and Purple Teams - Pentesting, SOC Assessment, Cloud Security Assessment and Supply Chain Risk Assessment
  • Executive and board advisory: Security Program Design, Board of Directors Security Strategy Review
Share page on facebook Share page on linkedin Share page by an email
Related Resources

Access a wealth of educational materials, such as datasheets, whitepapers, critical threat reports, informative cybersecurity topics, and top research analyst reports

See all resources

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • Network Security Platform
  • CLOUD DELIVERED SECURITY SERVICES
  • Advanced Threat Prevention
  • DNS Security
  • Data Loss Prevention
  • IoT Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Strata Cloud Manager
  • SECURE ACCESS SERVICE EDGE
  • Prisma Access
  • Prisma SD-WAN
  • Autonomous Digital Experience Management
  • Cloud Access Security Broker
  • Zero Trust Network Access
  • Code to Cloud Platform
  • Prisma Cloud
  • AI-Driven Security Operations Platform
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Cortex XSIAM
  • External Attack Surface Protection
  • Security Automation
  • Threat Prevention, Detection & Response
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsiblity
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
Paloaltonetworks logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2024 Palo Alto Networks. All Rights Reserved

  • Select your language