Date

By Type

By Product Category

By Features

By Technology

By Services

By Audience

Displaying 1 to 30 of 147

Government Use Case: Decrypt SSL and SSH Traffic to Disrupt Attacker Communications and Theft

SSL-encrypted traffic is growing in government networks, resulting in multiple blind spots for security monitoring tools and creating an opportunity for attackers to hide malware. Many governments are considering or mandating the decryption of encrypted communications moving in and out of their networks. While traditional approaches favor dedicated SSL decryption appliances, these add latency, costs and increase time to resolution for security incidents. Download our use case “Decrypt SSL and SSH Traffic to Disrupt Attacker Communications and Theft” to learn how Palo Alto Networks Next-Generation Security Platform delivers an integrated approach to SSL decryption that streamlines security operations, improves network performance, and enables agencies to identify and prevent encrypted threats swiftly.

  • 0
  • 15

2017 Gartner Magic Quadrant Leader - It Just Feels Right

Gartner’s 2017 Magic Quadrant for Enterprise Network Firewalls has been released. Palo Alto Networks is proud to be positioned in the leader quadrant for the sixth straight year.

  • 0
  • 39

Security Reference Blueprint for Retail

This white paper outlines key security principles for modern retail networks and a framework that reduces operational demands on IT and security teams while improving security and control.

  • 0
  • 18

The "Patient Zero" Problem and the Need for Modern Endpoint Protection

This paper from IDC, a premier global provider of market intelligence, examines modern endpoint protection, describing how the evolution of malware has created a need for a modernized approach to endpoint protection.

  • 0
  • 35

Next-Generation Cyber Risk Management

Since the release of the Cybersecurity Framework by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk. Download this white paper to explore the benefits of the CSF and how Palo Alto Networks Next-Generation Security Platform capabilities map to and fulfill CSF subcategories.

  • 0
  • 12

Streamline PCI Compliance With Next-Generation Security

Establishing, maintaining, and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for everyone in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as companies that store, process or transmit cardholder data (CHD) and/or sensitive authentication data. With approximately three hundred individual requirements to address, organizations subject to the standard have their work cut out for them. This white paper will explain how Palo Alto Networks® Next Generation Security Platform allows PCI system operators to significantly enhance security and exceed PCI DSS requirements through segmentation and mitigating risks of malware and unpatched systems.

  • 2
  • 2362

PCI Use Case: Simplify PCI Compliance With Network Segmentation

Establishing, maintaining and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for all entities involved in payment card processing – including merchants, processors, acquirers, issuers, and service providers, as well as all other entities that store, process or transmit cardholder data (CHD) and/or sensitive authentication data (SAD). For all system components included in or connected to the Cardholder Data Environment (CDE), organizations must comply with more than three hundred requirements. It is in every organization’s best interest, therefore, to take advantage of network segmentation provisions stated in the PCI DSS to effectively isolate their CDE and thereby decrease the amount of infrastructure that is considered in scope.

  • 0
  • 329

Protecting the Extended Perimeter with GlobalProtect Cloud Service

Your Perimeter Is Everywhere. The world you need to secure is undergoing tremendous transformation. Global expansion, mobile workforces and cloud computing are shifting the location of your applications, data and users. These changes introduce new opportunities for business, but they also create a set of cybersecurity risks. These tectonic shifts in location strain an organization’s ability to protect data and stop threats consistently. The mandate for security has not changed, but the ability to deliver protection at each location is at a crossroads. Many organizations, faced with the rising costs of extending the perimeter using conventional methods, are left with few other choices. These consequences place organizations at risk. It is important to understand where the risks lie to evaluate what must be done to bring security back into balance.

  • 0
  • 723

Apply Network Segmentation in the Virtualized Data Center

Read how Palo Alto Networks applies network segmentation to increase security and protect applications and data in a virtualized data center.

  • 0
  • 71

Machine Learning and Endpoint Security

The most promising weapon in the endpoint security arsenal is machine learning. Read how it quickly learns, makes instant decisions and rapidly prevent threats.

  • 0
  • 295

How the Next-Generation Security Platform Contributes to GDPR Compliance

Palo Alto Networks Next-Generation Security Platform can help with security and data protection efforts related to GDPR compliance by securing personal data.

  • 0
  • 515

Reducing the Business Risks of Cyberthreats

Your approach to cybersecurity can enable your business to innovate or introduce unnecessary risk. Consider reducing the business risks of cyberthreats.

  • 1
  • 213

Comprehensive Data Security in the Cloud

This white paper outlines three steps organizations can follow to effectively secure business-critical data in the cloud.

  • 0
  • 236

Campus in the Cloud

Palo Alto Networks IT Campus in the Cloud approach reduces office build times and enables branch offices to leverage local internet and cloud services.

  • 0
  • 244

Rethink Your Strategy to Defeat Evasive Attacks

Understanding evasive malware and effective strategies for preventing this emerging threat type can protect your organization against financial, operational, legal, regulatory and compliance risks.

  • 1
  • 788

Next-Generation Security for Retail Environments

In a competitive and rapidly changing industry that’s continually targeted by cyberthreats, creating a secure digital foundation is critical to success. Read this platform brief for a concise summary of how Palo Alto Networks helps retailers secure customer data while thwarting cyberattacks, streamlining security operations, and granting appropriate network access to employees, customers, suppliers and partners.

  • 1
  • 728

Traps for SCADA

Learn why Palo Alto Networks Traps is ideal for securing SCADA/ICS environments providing superior protection with minimal disruptions.

  • 3
  • 1677

The Next Board Problem: Automatic Enterprise Security Orchestration — A Radical Change in Direction

Commercial boards and senior government officials may be the only groups capable of kick-starting this new and necessary direction in the evolution of cybersecurity...

  • 0
  • 204

Cloud Adoption Risk and Compliance

Public cloud adoption poses risks. Senior leaders should understand and manage those risks in a way that is in line with the organization’s risk appetite.

  • 0
  • 157

Security Reference Blueprint for Financial Services

Learn how the Security Reference Blueprint for Financial Services IT enables institutions to prevent advanced threats without disrupting vital operations.

  • 1
  • 829

The Need for a Next-Generation Platform Approach in Mobile Networks

Read how Palo Alto Networks that helps mobile operators get ahead of cybercriminal capability and urgent mobile operator pain points.

  • 0
  • 202

Protect IOT Opportunity With Network-Based Security

Read how Palo Alto Networks provides advanced protects service provider networks, IoT systems, and interconnected networks and infrastructure.

  • 0
  • 336

Security Reference Blueprint for K-12 Education

The Security Reference Blueprint for K-12 Education suggests a framework for existing infrastructure and reduces operational demands on IT and security teams.

  • 0
  • 145

Security Reference Blueprint for Higher Education

This blueprint enables education security and IT pros to prepare to meet new and emerging technological challenges while reducing security threats.

  • 0
  • 345

A Modern Framework for Network Security in Government

Governments around the world are undergoing change. Whether reducing data center footprints, virtualizing existing services to reduce costs and "go green", or advancing security strategies to thwart advanced attacks in the field or at home, governments are demanding more from their cybersecurity solutions today.

  • 8
  • 1032

Today’s Cybersecurity Challenges in Government

Palo Alto Networks meets the cybersecurity needs of its government customers by providing a future-proof platform with visibility, prevention and resilience.

  • 0
  • 743

VM-Series for NSX: Implementation and Traffic Steering Guidelines

In today’s growing data center threat landscape, an effective cybersecurity strategy is imperative for software-defined data centers. VMware® and Palo Alto Networks® have partnered on a solution that leverages NSX™ to enable provisioning and seamless insertion of VM-Series next-generation firewall and advanced threat prevention in your software-defined data centers. Download this white paper to learn more about design considerations, recommendations and best practices for traffic steering while deploying VMware NSX and Palo Alto Networks VM-Series integrated solution.

  • 0
  • 628

Security Reference Blueprint for Healthcare IT

The Security Reference Blueprint for Healthcare IT enables organizations to protect patient care and patient data while reducing the security threats.

  • 21
  • 836

Security Platform for Financial Services

Read how thousands of banks, institutional investors, asset managers, broker-dealers and financial institutions across the globe prevent successful cyberattacks.

  • 0
  • 1845

Actionable Threat Intelligence

This document explores and highlights the capabilities of Palo Alto Networks network security management solution, and its ability to make critical information visible and actionable.

  • 23
  • 7902
Displaying 1 to 30 of 147