Date

Displaying 1 to 30 of 297

Securing the Unpatchable in Financial Institutions

There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue patches to remediate flaws, many financial institutions do not apply all available patches to their production environments. In addition, when systems or applications reach their end-of-support, they no longer receive vulnerability patches from their vendors. These two scenarios describe the conditions under which a system or application is considered "unpatchable." When patching or upgrading is no longer feasible, security professionals need to identify alternative ways to secure the unpatchable systems and applications to support their ongoing use in the environment.
  • 5
  • 580

Government Use Case: Network Security Consolidation

As Governments adopt digital technologies – employee remote access, citizen self-service, SaaS, cloud, and more – these same technologies introduce new points where the network can be infiltrated, and new valuable data that must be secured. The result was a cyber security arms race where new threats were countered with new security point products. Today, governments are consolidating security appliances and functions to gain better visibility and use scarce cybersecurity professionals wisely. Read this use case to discover • The advantages of a platform approach to network security consolidation. • Best practices for deployment. • How a government agency eliminated 10 security appliances at every location, simplifying compliance, management and reporting while improving security.
  • 3
  • 477

Palo Alto Networks’ Security Operating Platform Integration with SilentDefense

True resilience for critical infrastructure and data centers against cyber and operational issues.
  • 3
  • 114

Prisma: Cloud Data Protection

Prisma enables automated discovery, classification, monitoring, and protection of data across cloud storage and SaaS applications, with automated remediations before leaks can occur.
  • 0
  • 52

Prisma Cloud Threat Protection

The dynamic nature of public cloud environments requires security operations teams to adapt and embrace a new approach to securing the cloud. Threat assessment and mitigation are significantly impacted due to ephemeral cloud environments, decentralized management models, and distributed data across multi-cloud deployments. Threat prevention for the cloud needs to be built around the principles of attack surface reduction through segmentation and prevention controls, advanced threat detection measures built around user, network and host activity monitoring and behavioral baselines, and rapid response through automated remediation.
  • 0

Secure the Cloud: Cloud-Connected Branch

Your organization’s networking strategy is changing to support cloud applications. Find out how to protect branch and retail locations with Prisma Access.
  • 1
  • 131

Secure the Cloud: Cloud-Enabled Mobile Workforce

With cloud applications, your organization needs more than remote access VPN. Find out how to secure the cloud-enabled mobile workforce with Prisma Access.
  • 0
  • 119

Prisma: Cloud Governance & Compliance

Prisma continuously monitors your distributed multi-cloud environments and SaaS applications, proactively alerting you of any misconfigurations or compliance violations and even automates remediation so you can embrace the cloud with confidence.
  • 1

Secure the Cloud: Zero Trust Cloud Security

Protect your cloud applications based on the principles of Zero Trust. Use Prisma Access and protect the data in your cloud applications.
  • 2
  • 113

Protecting Developer Environments with the VM-Series for AWS

Download this whitepaper to learn how you can secure dev environments on AWS.
  • 3
  • 1218

10 Ways Prisma Public Cloud Complements Cloud-Native Security

Learn how Prisma Public Cloud complements your cloud-native security
  • 0

Simplify Zero Trust Implementation Using A Five-Step Methodology

Building Zero Trust networks is actually simpler than building legacy networks. This 5-step methodology makes deploying Zero Trust networks manageable, cost effective and non-disruptive.
  • 1
  • 79

13 Things Your Next Firewall Must Do

This paper outlines the 10 key things your next firewall must do to secure your network and your business.
  • 0
  • 923

Cortex XDR

Security teams face a dizzying array of threats, from ransomware and cyberespionage to fileless attacks and damaging data breaches. However, the biggest headache for many security analysts is not the endless number of risks that dominate news headlines but the frustrating, repetitive tasks they must perform every day as they triage incidents and attempt to whittle down an endless backlog of alerts.
  • 0
  • 187

5 Critical Mistakes When Evaluating A Next-Generation Firewall

NGFW Mistakes, Buying Myths, NGFW Evaluation, How to choose NGFW, 5 Mistakes to Avoid
  • 0

Gartner Report: Innovation and Insight for Cloud Security Posture Management (CSPM)

The rapid adoption of cloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and unmanaged risk. While IaaS providers deliver basic configuration and risk assessment capabilities, they only address their own services, which doesn’t account for the hybrid and multi-cloud capabilities that most enterprises require. And although the underlying cloud provider infrastructure is secure, most enterprises don’t have the processes, tooling maturity or scale to use the cloud securely.
  • 0
  • 175

Implementing 5G Security: Priorities and Preferences

Read this white paper to get key findings from the 2019 Heavy Reading service provider survey on implementing 5G security.
  • 0
  • 58

Reducing the Business Risks of Cyberthreats

Your organization’s approach to cybersecurity can either securely enable your business to innovate and make use of transformational technologies, like the cloud, or it can introduce unnecessary risk and complexity. In this era of advanced threats and mega-breaches, organizations face an increasingly sophisticated adversary, aided by automation and the power of the cloud. Those companies still relying on largely manual methods to deal with such threats are now seeking ways to adjust to the changing landscape.
  • 3
  • 632

Security Operating Platform Executive Summary

Provides a quick executive overview of the Palo Alto Networks Security Operating Platform, for securing the enterprise, securing the cloud and securing the future.
  • 1
  • 85

Security Operating Platform Overview R3

This reference document provides an overview of the Security Operating platform for securing the enterprise, securing the cloud and securing the future with Cortex.
  • 1
  • 92

Stop Targeted Attacks Without Decrypting Traffic

Stop Targeted Attacks Without Decrypting Traffic
  • 3
  • 4836

BDO Cortex Managed Services Solution Brief

BDO, through BDO Israel’s Cybersecurity Center and its global network of BDO firms, has specialized in establishing managed detection and response (MDR) capabilities for organizations since 2002. In the past, only large enterprises built such capabilities. Today, it is clear that organizations of all sizes must have effective detection and response capabilities as part of their cybersecurity programs. However, costs, knowhow, and talent acquisition are real challenges for every organization, highlighting the importance of the evolution of managed detection and response service
  • 0
  • 142

PwC Cortex Managed Services Solution Brief

Cortex™ AI-based continuous security platform by Palo Alto Networks delivers new levels of simplicity in security operations and significantly improved security outcomes through automation and unprecedented accuracy. The platform solves pain points for managed service partners, providing complete visibility from a single data source and the ability to respond as a managed service across the whole environment. Today, with Cortex XDR detection and response, partners can provide managed threat hunting, investigation, and response across network, endpoint, and cloud environments
  • 0
  • 156

Critical Start Cortex managed services

Using a battle-tested assessment and implementation process, CRITICALSTART can assist you with deployments of all sizes. CRITICALSTART’s Zero-Trust Analytics Platform (ZTAP) model investigates all security alerts until they are classified as good or normal and are safely filtered out. Using this approach, customers experience a 99 per-cent reduction in alerts. Zero Trust is the only option when it comes to zero tolerance
  • 0
  • 141

Security Operations Extends Beyond EDR

Security teams are being asked to do more with less as they face increasingly complex scenarios and tight timelines. We worked with 451 research group to survey respondents with experience in deploying EDR from a variety of midsized and larger organizations in North America, Europe, and Asia. We asked them broader questions Like: Are there other opportunities for improvement in the SOC? What else is being used besides EDR? How do organizations plan their security operations for increased effectiveness? The survey data indicates that there are many opportunities for improving security operations, both within each tier and across tiers. Read this paper and learn more on the capabilities and process available for you, today.
  • 1
  • 447

Stop Attackers from Using DNS Against You

Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is a protocol that translates user-friendly domain names, such as www.paloaltonetworks.com, into machine usable IP addresses—in this case, 199.167.52.137. Without DNS, we’d have to memorize random strings of numbers, which our brains aren’t well equipped to do. DNS is fundamental to every single modern organization, all over the world. Network operators cannot block DNS traffic, and firewalls have to let it through. Networks need DNS to function properly.
  • 0
  • 62

Replacing Remote Access VPN With GlobalProtect Cloud Service

This solution brief provides an overview for using GlobalProtect Cloud Service as remote access VPN.
  • 1
  • 10319

Palo Alto Networks and Trustwave

Cortex is the industry’s only open and integrated AI-based continuous SOC platform. It delivers new levels of simplicity in security operations and significantly improves security outcomes through automation and unprecedented accuracy. The platform solves pain points for managed service partners—specifically, it provides complete visibility from a single data source and the ability to respond as a managed service across the whole environment. Today, with Cortex XDR cloud-based detection and response, partners can provide managed threat hunting, investigation and response across network, endpoint, and cloud environments.
  • 0
  • 181

Essentials for Effortless Endpoint Protection, Detection and Response

Read this white paper and learn how about an integrated EPP and EDR approach.
  • 0
  • 88

Cybersecurity reference blueprint for manufacturing

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
  • 0
Displaying 1 to 30 of 297