Date

Displaying 1 to 30 of 268

10 Things Your Next Firewall Must Do

This paper outlines the 10 key things your next firewall must do to secure your network and your business.
  • 2
  • 6592

5G Security - Establishing a holistic security approach

Security is more important than ever for Service Providers evolving networks to 5G. New approaches for securing their networks will be needed.
  • 0
  • 468

AWS Reference Architecture

This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud. For an organization with a desire to move to public cloud infrastructure, the next question is often “How do I secure my applications in a public cloud?” This guide provides an overview of AWS components and how they can be used to build a scalable and secure public cloud infrastructure on AWS using the VM-Series. The architectures begin with a single virtual private cloud suitable for organizations getting started and scales to thousands to meet any size organization’s operational requirements.
  • 5
  • 8229

Azure Reference Architecture

Although IaaS providers are responsible for ensuring the security and availability of their infrastructure, ultimately, organizations are still responsible for the security of the applications and data. This reference architecture describes how your organization can use the Palo Alto Networks® VM-Series firewalls to bring visibility, control, and protection to your applications built in Microsoft Azure. This document provides architectural guidance for solution architects and engineers who are familiar with the next-generation firewall but not Azure. It links the technical aspects of the Azure and Palo Alto Networks solution together before exploring the technical design models of the architecture. Use this guide as a roadmap for architectural discussions between Palo Alto Networks and your organization.
  • 4
  • 7223

Increase VDI Scalability with Traps

Traps lightweight structure has minimal impact on resources while protecting VDIs and virtual machines against today's advanced threats.
  • 0
  • 54

Rethink Your Strategy to Defeat Evasive Attacks

Understanding evasive malware and effective strategies for preventing this emerging threat type can protect your organization against financial, operational, legal, regulatory and compliance risks.
  • 2
  • 1166

Bridging Security Gaps with Network-to-Endpoint Integration

The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any.
  • 0
  • 121

Government use case: Maintain the integrity of election systems

Enable citizens to exercise their right to vote, preserve trust in the process, and meet recommendations and regulations for securing the vote
  • 0
  • 915

Securing Developer Environments on AWS

Download this whitepaper to learn how you can secure dev environments on AWS.
  • 0
  • 906

Extended Application-Layer Visibility Across Multiple Mobile Network Peering Points

Palo Alto Networks Next-Generation Security Platform includes features that enhance application-layer protection and visibility across all network peering points.
  • 1
  • 595

Best Practices for Executing on Zero Trust

Read how to apply the Zero Trust cybersecurity strategy through transformation to a prevention-based architecture. Included are technical capabilities as well as business outcomes for each level of transformation as well as tools to measure your capabilities as you progress through the transformation journey.
  • 2
  • 0

Combine Network and Endpoint Security for Better Visibility, Protection, and Enforcement

This paper examines the changing threat landscape and highlights the importance of best-in-class endpoint protection working in lockstep with other security products to create coordinated and comprehensive enterprise security. Palo Alto Networks Traps advanced endpoint protection provides superior endpoint threat prevention as well as bridges the gap between endpoint security and network security, augmenting next-generation firewalls to provide stronger defense with fewer resources.
  • 0
  • 1184

Cybersecurity Survival Guide

Next-generation implies that new methods of processing and securing network traffic are being used to provide visibility and control over traffic, applications, and threats. Enterprise security deals with threat protection for large and complex organizations; while cybersecurity scales the vast landscape of the Internet riddled with vulnerabilities and viruses.
  • 5
  • 1759

Decryption: Why, Where and How

Learn where, when and how to decrypt – everything from people, processes and tools to best practices – to prevent threats and secure your business.
  • 0
  • 419

Security Platform for Healthcare Providers

Prevent successful cyberattacks on Healthcare systems and protect sensitive data
  • 7
  • 1929

Palo Alto Networks VM-Series Firewall Deployment on NSX SD-WAN Edge

Protect your NSX SD-WAN deployment using Palo Alto Networks VM-Series. Learn about how to take advantage of all of the protections of the platform using integration with VeloCloud, now part of VMware.
  • 0
  • 215

Palo Alto Networks and Medigate

Healthcare Device Identification, Classification, and Threat Prevention
  • 0
  • 177

How the Next-Generation Security Platform Contributes to GDPR Compliance

Palo Alto Networks Next-Generation Security Platform can help with security and data protection efforts related to GDPR compliance by securing personal data.
  • 1
  • 3740

A Smarter Approach for MSSPs

Security helps businesses increase productivity by safely enabling applications, cloud services, mobility, and the use of connected "things". However, many organizations lack the cybersecurity skills, automation, and resources needed to keep up with today's rapidly evolving security threats. This is driving demand for Managed Security Service Providers (MSSP's) to deliver security that helps their customers minimize their business risk, augment their IT security teams and secure their networks.
  • 0
  • 50

Palo Alto Networks’ Security Operating Platform Integration with SilentDefense

True resilience for critical infrastructure and data centers against cyber and operational issues.
  • 0
  • 41

Cybersecurity for Government Platform Brief 

A strong cyber defense, agile to the needs of governments globally as well as to adversaries’ tactics and tool changes, is germane to the future. Palo Alto Networks meets the cybersecurity needs of its government customers by providing a future-proof platform with visibility, prevention and resilience – from the endpoint to the heart of the network, data center and cloud – and for all threat types for IT and OT networks.
  • 0
  • 928

3 Requirements for Secure Digital Transformation

To secure digital transformation without slowing down the business requires an integrated approach – harnessing the agility of the cloud along with the power of automation and analytics – to simplify operations and bring about better security outcomes with less effort.
  • 0
  • 169

Cyberscurity for State and Provincial Governments

Overview of how state and provincial governments can secure network, endpoint, and cloud environments with the Security Operating Platform
  • 0
  • 358

The Security Platform for Managed Security Service Providers (MSSPs)

The world's leading MSSPs power profitable growth and high customer satisfaction with the Palo Alto Networks Next-Generation Security Platform.
  • 0
  • 1096

PALO ALTO NETWORKS SOC2 CERTIFICATION

Palo Alto Networks® strives to protect our way of life in the digital age by safely enabling applications and ensuring that customer data is secure, everywhere. As a leading cybersecurity company, we are focused on both the security and privacy of our customers, and we have developed our Next-Generation Security Platform from the ground up to support both. Download this document to learn more on WildFire and Aperture SOC2 certification.
  • 2
  • 1512

Cyber Threat Report: Reconnaissance 2.0

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
  • 0
  • 344

Cybersecurity Reference Blueprint for Financial Services IT

Learn how financial institutions may prevent successful cyberattacks by incorporating various elements of the Palo Alto Networks security operating platform into their overall cybersecurity program.
  • 3
  • 1852

Actionable Security Intelligence

This white paper describes how Palo Alto Network next-generation firewalls and Panorama help you get actionable security insights.
  • 27
  • 14852

Securing the Unpatchable in Financial Institutions

There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue patches to remediate flaws, many financial institutions do not apply all available patches to their production environments. In addition, when systems or applications reach their end-of-support, they no longer receive vulnerability patches from their vendors. These two scenarios describe the conditions under which a system or application is considered "unpatchable." When patching or upgrading is no longer feasible, security professionals need to identify alternative ways to secure the unpatchable systems and applications to support their ongoing use in the environment.
  • 4
  • 484

Airline IT SECURITY REFERENCE BLUEPRINT

Get more info about Palo Alto Networks Security Operating Platform
  • 0
  • 163
Displaying 1 to 30 of 268