Date

Displaying 1 - 30 of 340

White Paper

How SOAR is transforming threat intelligence

This white paper talks about how we need to transform threat intelligence by integrating it into an extensible SOAR platform enabling analysts to take full control over their threat intelligence combined with the power of proven SOAR capabilities.

White Paper

Secure Transformation: Replacing Remote Access VPN with Prisma Access

This solution brief provides an overview for using GlobalProtect Cloud Service as remote access VPN.

White Paper

Cortex XDR

Security teams face a dizzying array of threats, from ransomware and cyberespionage to fileless attacks and damaging data breaches. However, the biggest headache for many security analysts is not the endless number of risks that dominate news headlines but the frustrating, repetitive tasks they must perform every day as they triage incidents and attempt to whittle down an endless backlog of alerts.

White Paper

Palo Alto Networks & Securonix Integration Guide

For technical details and to configure the integration between our two products, download this integration guide.

White Paper

Minimize Role-Based Access Control Challenges with Dynamic User Groups

Available with PAN-OS® 9.1, Dynamic User Groups (DUGs) solve RBAC challenges by allowing admins to change a user’s group membership on the Next-Generation Firewall instantaneously, without waiting for changes to be applied in the directory.

White Paper

How Palo Alto Networks Next-Generation Security Platform Supports Use of the NIST Cybersecurity framework

Since the release of the Cybersecurity Framework (CSF) by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk. The CSF can be applied to businesses of all sizes, across regions and industries, and is being incorporated into national risk frameworks around the globe. Given its proven ability to aid in risk management and reduction, some industries have even begun to mandate its implementation. Namely, the White House recently issued an executive order requiring all federal agencies to immediately begin using the CSF to assess and manage cyber risk to protect critical infrastructure in their enterprises. Designed to foster positive and productive risk and cybersecurity management dialogue among internal and external business stakeholders, the CSF provides a common language for all appropriate teams, spanning IT, operations, security, finance, C-suite and board of directors. Based on this open dialogue, organizations can more effectively quantify risk and prioritize investments to mitigate it. Palo Alto Networks® Next-Generation Security Platform aligns with the CSF’s primary directive of enabling critical infrastructure operations to effectively identify, manage and reduce cyber risk. Rooted in prevention, the Next-Generation Security Platform is natively integrated to counter cyberattacks before they manifest in an organization’s environment. With full visibility into traffic – across the network, endpoints and the cloud – organizations can prevent cyberattacks based on how or where applications and data reside or are being used. This allows critical infrastructure organizations to identify the most serious ongoing threats to key business operations and reduce overall cybersecurity risk. Download this white paper to explore the benefits of the CSF and how Palo Alto Networks Next-Generation Security Platform capabilities map to and fulfill CSF subcategories.

White Paper

Migrating to Panorama

Migrating to network security management may seem daunting, it is easier than most administrators believe. In addition to showing the benefits of centralized management, this paper will discuss how to streamline the move from individually managed next-generation firewalls to centrally managed deployments.

White Paper

RedSeal Technology Partner Program Use Case Documentation

Use Cases for Integration with the Palo Alto Networks Security Operating Platform

White Paper

21st Century SCADA Security with Mario Chiock (WP)

SCADA and Industrial Control Systems experience unprecedented levels of agility, speed, and cost savings with the adoption of information technology and increased connectivity to supporting networks. However, with this modernization have also come undesired IT vulnerabilities and other threat vectors which are increasingly being exploited by malicious actors. The need for improved security in ICS has never been higher and has become a board-level issue for many organizations. In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.

White Paper

Cortex XDR Endpoint Protection Overview

This paper provides a deeper look at the Cortex XDR agent features, functionality, and technical architecture.

White Paper

Public Cloud as Outsourcing for Financial Services

Read this white paper to learn some common areas of interest shared by financial regulators over public cloud use by financial institutions.

White Paper

Security Reference Blueprint for K-12 Education IT

This reference blueprint suggests ways K-12 institutions can reduce cyber risks and protect operations, data and students with a consistent and coordinated approach to cybersecurity.

Datasheet

Top 5 Requirements for Effective Endpoint Protection

Attackers must complete a certain sequence of events, known as the attack lifecycle, to accomplish their objectives, whether stealing information or running ransomware. Nearly every attack relies on compromising an endpoint to succeed, and although most organizations have deployed endpoint protection, infections are still common.

White Paper

Palo Alto Networks & Claroty Integration Guide

Technology Partner, Integration, Integration guide, use case, deployment guide, tech partner, Claroty, IoT, ot.

White Paper

Enabling Secure Industrial Digital Transformation

This executive-level whitepaper from industrial automation market experts, ARC Advisory Group, covers the challenges industrial asset owner-operators will face as they embark on their OT digital transformation initiatives.

White Paper

Federal Government Defense Security Reference Blueprint

This guide outlines the challenges Defense agencies face and methods they can use to integrate the Palo Alto Networks ecosystem into the Federal Enterprise Architecture (FEA) to fight modern threats, meet current and future security objectives, and improve cyber resilience and operations.

White Paper

Palo Alto Networks & Area 1 Joint Solution Brief

Palo Alto Networks & Area 1 Joint Solution Brief

White Paper

Cybersecurity reference blueprint for manufacturing

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.

White Paper

Services Spotlight

Palo Alto Networks Recognized by J.D. Power and TSIA for Exceptional Performance in the Delivery of Support Services for the Third Consecutive Year

White Paper

Platform Brief for Manufacturing

Manufacturers are employing the industrial internet of things and other innovative technologies to produce quality goods efficiently. Read this platform brief for a summary of how Palo Alto Networks helps manufacturers compete in the global marketplace while streamlining security operations, protecting valuable data, and preventing new and known threats from impacting operations or uptime of corporate and ICS/SCADA networks.

White Paper

Network Visibility, Detection and Response Modern Analytics for Today’s Threats

451 Research's analysis of the network visibility and analytics your security operations team needs to effectively defend against sophisticated threats.

Datasheet

The 12 Most Critical Risks for Serverless Applications

In this detailed guide, the Cloud Security Alliance (CSA) classifies the potential risks for applications built on serverless architectures.

White Paper

Continuous Diagnostics and Mitigation (CDM) - at a Glance

This whitepaper describes how Palo Alto Networks provides an easy-to-use, cost-effective management environment that enables integrators and agencies to meet CDM requirements.

White Paper

Palo Alto Networks & Aruba Networks Solution Overview

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.

White Paper

Palo Alto Networks & Splunk Partnership At A Glance

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.

White Paper

Palo Alto Networks & Splunk Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.

White Paper

Palo Alto Networks & Boldon James Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.

White Paper

SWIFT Mandatory and Advisory Security Controls

Successful cyberattacks against a number of financial institutions across the globe from 2015-2018 have resulted in multiple instances of fraudulent fund transfers over the Society for Worldwide Interbank Financial Telecommunications, or SWIFT, network. As part of an effort to enhance the cybersecurity of the entire eco-system, members of SWIFT must annually self-attest to sixteen mandatory cybersecurity controls as of year-end 2017. In future years, non-compliance with these controls may result in notification to SWIFT counterparties and/or appropriate regulatory bodies. Furthermore, eleven advisory security controls are provided as best practices to further improve overall cyber hygiene across the SWIFT eco-system. No single vendor can provide complete compliance with the entire set of SWIFT mandatory and advisory controls. However, the Palo Alto Networks Security Operating Platform delivers the following: Support for nearly 75 percent of the SWIFT Customer Security Controls Framework, where various elements of the Security Operating Platform are able to address 12 of 16 mandatory controls and eight of 11 advisory controls. Definitive least-privileged access control and other essential security capabilities to effectively segment and protect the local SWIFT environment. Capabilities above and beyond the baseline specifications to more thoroughly protect your local SWIFT infrastructure and the rest of your organization’s computing environment from the latest unknown malware and advanced threats. By leveraging the Palo Alto Networks Security Operating Platform, financial institutions will be well on their way to complying with or exceeding the SWIFT mandatory and advisory controls. Beyond merely an exercise in compliance, the prevention philosophy behind the platform will improve a financial institutions overall cyber hygiene and provide better security outcomes for the organization. The result will be a more secure environment for your financial institution – one in which legitimate traffic is known and limited, with automated security enforcement to detect and address deviations. Future annual self-attestations to SWIFT will be much less stressful as your institution’s cybersecurity posture will be above and beyond their required baseline level.

White Paper

Security Reference Blueprint for Higher Education

The Security Reference Blueprint for Higher Education outlines security principles and a framework using the preventative capabilities of the Palo Alto Networks Next-Generation Security Platform. Using this blueprint enables education security and IT professionals to protect PII and IP data, maintain a high-performance, high-availability learning environment, and prepare to meet new and emerging technological challenges while reducing security threats.

White Paper

Incident Response Reporting Template

With this template, you can summarize the entire incident with important measurement and recording metrics and more!
Displaying 1 - 30 of 340