Date

Displaying 1 to 30 of 322

Security Reference Blueprint for Higher Education

The Security Reference Blueprint for Higher Education outlines security principles and a framework using the preventative capabilities of the Palo Alto Networks Next-Generation Security Platform. Using this blueprint enables education security and IT professionals to protect PII and IP data, maintain a high-performance, high-availability learning environment, and prepare to meet new and emerging technological challenges while reducing security threats.
  • 2
  • 856

Palo Alto Networks & cPacket Joint Solution

Next-Generation Firewalls can provide detailed information on events or devices whose traffic they directly handle or access. This information is normally only related to the traffic flowing through the firewall itself, and traces generally need to be activated on demand as well as used with caution, so as not to affect firewall performance.
  • 0

Incident Response Reporting Template

With this template, you can summarize the entire incident with important measurement and recording metrics and more!
  • 0

Supercharge your Security Operations Center

Download this whitepaper to discover best practices that enhance analyst's productivity and therefore reduces the organization’s risk.
  • 0

Security Automation and Orchestration - The Human Perspective

Security Orchestration - like a conductor conducting a harmonious musical symphony. You need to make music. Not noise.
  • 0

Palo Alto Networks & Boldon James Integration Guide

For technical details and to configure the integration between our two products, download this integration guide.
  • 0

Government use case: Maintain the integrity of election systems

Enable citizens to exercise their right to vote, preserve trust in the process, and meet recommendations and regulations for securing the vote.
  • 0
  • 1083

MARS-E Executive Briefing

Making sense of MARS-E is geared towards State CIOs, Enterprise Architects, global system integrators (GSIs), and all Administering Entities (AEs) involved in the modernizing of state Medicaid, Integrated Eligibility, or Children’s Health Insurance Program (CHIP) systems
  • 0

CDM Stategy At a Glance

2019 is a significant year for the DHS Continuous Diagnostics and Mitigation (CDM) program, as agencies are actively rolling out enhancements to the platforms they have deployed since 2013.
  • 0

Securing the Unpatchable in Financial Institutions

There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue patches to remediate flaws, many financial institutions do not apply all available patches to their production environments. In addition, when systems or applications reach their end-of-support, they no longer receive vulnerability patches from their vendors. These two scenarios describe the conditions under which a system or application is considered "unpatchable." When patching or upgrading is no longer feasible, security professionals need to identify alternative ways to secure the unpatchable systems and applications to support their ongoing use in the environment.
  • 6
  • 698

Federal Civilian Security Reference Blueprint

The Security Reference Blueprint for Federal Civilian Departments and Agencies helps the U.S. deliver on its mission and business objectives to safely and securely render services to the American public, while advancing the Nation's agenda.
  • 2

Extended Application-Layer Visibility Across Multiple Mobile Network Peering Points

Palo Alto Networks Next-Generation Security Platform includes features that enhance application-layer protection and visibility across all network peering points.
  • 2
  • 789

Security Operating Platform Executive Summary

Provides a quick executive overview of the Palo Alto Networks Security Operating Platform, for securing the enterprise, securing the cloud and securing the future.
  • 1
  • 222

Three Use Cases for Securing a Hybrid Data Center

Securing the modern, hybrid data center requires a uniform approach across physical, virtualized, and cloud environments. The key is to gain granular visibility, control, and consistent threat protection in your hybrid data center without added complexity.
  • 1
  • 69

Palo Alto Networks & ATAR Labs Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 0

Palo Alto Networks & Mnemonic Integration Guide

For technical details and to configure the integration between our two products, download this integration guide.
  • 0

Palo Alto Networks & Mnemonic Joint Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 0

Simplify Zero Trust Implementation with a five-step methodology

Companies are often reluctant to begin their Zero Trust journey because they believe it is difficult, costly, and disruptive but building Zero Trust networks is actually much simpler than building legacy 20th-century hierarchical networks.
  • 0

Palo Alto Networks & ATAR Labs Integration Guide

For technical details and to configure the integration between our two products, download this integration guide.
  • 0

Palo Alto Networks VM-Series & Citrix SD-WAN Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 0
  • 67

Securing Virtual Desktop Infrastructure (VDI) with Traps

How traps eliminate the challenges a traditional endpoint solution introduces in a virtual environment
  • 0
  • 351

Palo Alto Networks VM-Series and Citrix SD-WAN Integration Guide

For technical details and to configure the integration between our two products, download this integration guide.
  • 0
  • 62

Palo Alto Networks NGFW & AttackIQ Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 0

The Value of Certifications

This whitepaper describes the need for cybersecurity certifications, the value companies, and cybersecurity professionals gain when attaining cybersecurity certifications. Also, describes the different Palo Alto Networks Certifications available with resources links.
  • 3
  • 460

Palo Alto Networks & Vectra Networks

Palo Alto Networks and Vectra Networks provide our customers with increased visibility and synchronized protection to effectively combat today’s advanced threats.
  • 0
  • 884

Applying Zero Trust to Cloud Environments

This whitepaper details how establishing a Zero Trust strategy will better protect your growing organization for the long-term.
  • 0
  • 127

Palo Alto Networks & BackBox Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 0
  • 52

Palo Alto Networks & CryptoniteNXT Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 0

Platform Brief for Manufacturing

Manufacturers are employing the industrial internet of things and other innovative technologies to produce quality goods efficiently. Read this platform brief for a summary of how Palo Alto Networks helps manufacturers compete in the global marketplace while streamlining security operations, protecting valuable data, and preventing new and known threats from impacting operations or uptime of corporate and ICS/SCADA networks.
  • 2
  • 1489

Maximize the ROI of Detection and Response

Download this white paper to learn how to maximize the ROI and cut the cost of detection and response.
  • 1
  • 287
Displaying 1 to 30 of 322