Date

Displaying 1 to 30 of 284

Implementing 5G Security: Priorities and Preferences

Read this white paper to get key findings from the 2019 Heavy Reading service provider survey on implementing 5G security.
  • 0

Gartner Report: Innovation and Insight for Cloud Security Posture Management (CSPM)

The rapid adoption of cloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and unmanaged risk. While IaaS providers deliver basic configuration and risk assessment capabilities, they only address their own services, which doesn’t account for the hybrid and multi-cloud capabilities that most enterprises require. And although the underlying cloud provider infrastructure is secure, most enterprises don’t have the processes, tooling maturity or scale to use the cloud securely.
  • 0

Reducing the Business Risks of Cyberthreats

Your organization’s approach to cybersecurity can either securely enable your business to innovate and make use of transformational technologies, like the cloud, or it can introduce unnecessary risk and complexity. In this era of advanced threats and mega-breaches, organizations face an increasingly sophisticated adversary, aided by automation and the power of the cloud. Those companies still relying on largely manual methods to deal with such threats are now seeking ways to adjust to the changing landscape.
  • 3
  • 627

Security Operating Platform Executive Summary

Provides a quick executive overview of the Palo Alto Networks Security Operating Platform, for securing the enterprise, securing the cloud and securing the future.
  • 1

Security Operating Platform Overview R3

This reference document provides an overview of the Security Operating platform for securing the enterprise, securing the cloud and securing the future with Cortex.
  • 0

Critical Start Cortex managed services

Using a battle-tested assessment and implementation process, CRITICALSTART can assist you with deployments of all sizes. CRITICALSTART’s Zero-Trust Analytics Platform (ZTAP) model investigates all security alerts until they are classified as good or normal and are safely filtered out. Using this approach, customers experience a 99 per-cent reduction in alerts. Zero Trust is the only option when it comes to zero tolerance
  • 0
  • 113

Stop Targeted Attacks Without Decrypting Traffic

Stop Targeted Attacks Without Decrypting Traffic
  • 2
  • 4772

PwC Cortex Managed Services Solution Brief

Cortex™ AI-based continuous security platform by Palo Alto Networks delivers new levels of simplicity in security operations and significantly improved security outcomes through automation and unprecedented accuracy. The platform solves pain points for managed service partners, providing complete visibility from a single data source and the ability to respond as a managed service across the whole environment. Today, with Cortex XDR detection and response, partners can provide managed threat hunting, investigation, and response across network, endpoint, and cloud environments
  • 0
  • 121

BDO Cortex Managed Services Solution Brief

BDO, through BDO Israel’s Cybersecurity Center and its global network of BDO firms, has specialized in establishing managed detection and response (MDR) capabilities for organizations since 2002. In the past, only large enterprises built such capabilities. Today, it is clear that organizations of all sizes must have effective detection and response capabilities as part of their cybersecurity programs. However, costs, knowhow, and talent acquisition are real challenges for every organization, highlighting the importance of the evolution of managed detection and response service
  • 0
  • 117

Security Operations Extends Beyond EDR

Security teams are being asked to do more with less as they face increasingly complex scenarios and tight timelines. We worked with 451 research group to survey respondents with experience in deploying EDR from a variety of midsized and larger organizations in North America, Europe, and Asia. We asked them broader questions Like: Are there other opportunities for improvement in the SOC? What else is being used besides EDR? How do organizations plan their security operations for increased effectiveness? The survey data indicates that there are many opportunities for improving security operations, both within each tier and across tiers. Read this paper and learn more on the capabilities and process available for you, today.
  • 1
  • 205

Stop Attackers from Using DNS Against You

Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is a protocol that translates user-friendly domain names, such as www.paloaltonetworks.com, into machine usable IP addresses—in this case, 199.167.52.137. Without DNS, we’d have to memorize random strings of numbers, which our brains aren’t well equipped to do. DNS is fundamental to every single modern organization, all over the world. Network operators cannot block DNS traffic, and firewalls have to let it through. Networks need DNS to function properly.
  • 0

Replacing Remote Access VPN With GlobalProtect Cloud Service

This solution brief provides an overview for using GlobalProtect Cloud Service as remote access VPN.
  • 1
  • 10158

Palo Alto Networks and Trustwave

Cortex is the industry’s only open and integrated AI-based continuous SOC platform. It delivers new levels of simplicity in security operations and significantly improves security outcomes through automation and unprecedented accuracy. The platform solves pain points for managed service partners—specifically, it provides complete visibility from a single data source and the ability to respond as a managed service across the whole environment. Today, with Cortex XDR cloud-based detection and response, partners can provide managed threat hunting, investigation and response across network, endpoint, and cloud environments.
  • 0
  • 137

Essentials for Effortless Endpoint Protection, Detection and Response

Read this white paper and learn how about an integrated EPP and EDR approach.
  • 0

Cybersecurity reference blueprint for manufacturing

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
  • 0

Security Reference Blueprint for Healthcare IT

Healthcare security reference blueprint
  • 22
  • 1255

Traps Technical Overview

Most organizations deploy a number of security products to protect their endpoints, including one or more traditional antivirus solutions. Nevertheless, cyber breaches continue to increase in frequency, variety and sophistication. Faced with the rapidly changing threat landscape, current endpoint security solutions and antivirus can no longer prevent security breaches on the endpoint. Palo Alto Networks® Traps™ advanced endpoint protection replaces traditional antivirus with a unique combination of the most effective, purpose-built, malware and exploit prevention methods that pre-emptively block known and unknown threats from compromising a system.
Santa Clara, CA
  • 15
  • 45230

Cyber Threat Report: Reconnaissance 2.0

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
  • 1
  • 574

Take a Smarter Approach to Cybersecurity With a Next-Generation Security Operations Center

Download the whitepaper to learn how the adaptive SOC is a way to better protect your organization from cybersecurity threats today and into the future
  • 3
  • 57

NB-IoT Security

Enabling a Safer Hyper-Connected World
  • 0
  • 211

AWS Reference Architecture

This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud. For an organization with a desire to move to public cloud infrastructure, the next question is often “How do I secure my applications in a public cloud?” This guide provides an overview of AWS components and how they can be used to build a scalable and secure public cloud infrastructure on AWS using the VM-Series. The architectures begin with a single virtual private cloud suitable for organizations getting started and scales to thousands to meet any size organization’s operational requirements.
  • 9
  • 11217

Redefine Security Operations with XDR

Introducing a breakthrough approach to SOC visibility, investigation and speedy resolution: XDR, detection and response across the network, endpoint or cloud.
  • 1
  • 1513

Securing SD-WAN with the Palo Alto Networks Next-Generation Security Platform

Palo Alto Networks provides security for SD-WAN.
  • 0
  • 6689

Securing Developer Environments on AWS

Download this whitepaper to learn how you can secure dev environments on AWS.
  • 2
  • 1136

Executive Overview: The Next Evolution in Cloud Security

The current landscape of networking and security overlay products are creating administrative problems with cost and complexity, and falling short on the protections that organizations need. Learn about how Palo Alto Networks is changing the game with GlobalProtect Cloud Service and Aperture.
  • 2
  • 938

Safely Enable Your SaaS Applications

The use of SaaS applications is creating gaps in security visibility and new risks for threat propagation, data leakage and regulatory noncompliance. See how Aperture can help.
  • 2
  • 13579

5 Requirements for Effective Endpoint Protection

Download this white paper and learn about the differentiating features of Traps Advanced Endpoint
  • 0
  • 947

12 Best Practices to Enhance the Security of Your AWS Configurations

Amazon® Web Services has been an advocate for strong cloud security since it launched in 2006. AWS® and its customers employ a shared responsibility model that distributes security roles between the provider and customer. As a public cloud vendor, AWS owns the infrastructure, physical network and hypervisor. The enterprise owns the workload operating system, apps, virtual network, access to their tenant environment/account and the data.
  • 0
  • 493

IPS as part of a Platform

Palo Alto Networks differs from traditional IPS by bringing together vulnerability protection, network anti-malware and anti-spyware into one service.
  • 0
  • 4197

How the Next-Generation Security Platform Contributes to GDPR Compliance

Palo Alto Networks Next-Generation Security Platform can help with security and data protection efforts related to GDPR compliance by securing personal data.
  • 1
  • 4062
Displaying 1 to 30 of 284