Date

By Product Category

By Features

By Technology

By Services

By Audience

Displaying 1 to 30 of 155

Protect Yourself From Antivirus

Traditional antivirus is not the solution to preventing endpoint breaches—it’s the problem. If you’re still using antivirus you are leaving your organization vulnerable to malicious attack.

Santa Clara, CA
  • 3
  • 17319

EU Data Protection Compliance When Securing SaaS Applications

The purpose of this white paper is to clarify how Networks Aperture™ SaaS security service can be used in compliance with EU data protection requirements, including the upcoming EU General Data Protection Regulation.

  • 0
  • 41

5 Critical Mistakes When Evaluating A Next-Gen Firewall

The firewall is the foundation of enterprise data security. All firewalls are not created equal, though and no two organizations have the same needs, risks and data flow. You need a firewall to protect against today’s advanced attacks while preserving the performance and uptime critical to foster innovation and growth. If you’re in the market for a new firewall, we’ll assume you understand the many benefits of next-generation firewall technology, and that a next-generation firewall is the way to go. But how can you be sure you’re choosing the right next-generation firewall to meet your organization’s specific networking, performance and security needs for the present and the future?

  • 0
  • 9

Use Case: Apply Network Segmentation to a Traditional Data Center

Read how one of the largest financial institutions in the world created network segmentation with the Palo Alto Networks Next-Generation Security Platform

  • 2
  • 64

Secure and Protect Medical Devices in Healthcare

Read this whitepaper to understand how Palo Alto Networks security platform provides best-in-class security for medical devices in a healthcare environment.

  • 2
  • 149

Government: Securing Your Public Cloud Deployment

This paper explains how Palo Alto Networks VM-Series can provide threat prevention across your AWS GovCloud or C2S environments.

  • 2
  • 334

Rethink Mobile Security Monetization

This paper for mobile network operators provides a framework for value and revenue opportunities across the entire subscriber base.

  • 2
  • 196

6 Key Security Requirements for Next–Generation Mobile Networks

A new security approach is needed focusing on prevention, application-layer visibility, cost efficiency and automation.

  • 5
  • 384

Rethink Network Availability

Mobile network operators are now facing new malware-based incidents that threaten network availability as well as subscriber confidentiality.

  • 1
  • 200

Securing the Mobile Workforce

In recent years, cybersecurity has emerged as one of the top concerns for the leader- ship of business and government organi- zations around the world. The troubling number of high-profile attacks targeting some of the largest companies in the world has led many to question whether adequate measures are in place on their own networks. Sophisticated attackers are employing new techniques to penetrate a network, and using methodologies to avoid detection by masking their activities in legitimate application traffic.

  • 29
  • 1645

Securing the Unpatchable in Financial Services

This case study discusses the security, risk and compliance ramifications of operating unpatchable systems, such as Windows® XP and Windows Server 2003. In financial services, these unsupported operating systems may still be found in ATMs and aging systems that support check scanners, printers for passbooks (bankbooks), ATM cards, on-demand checkbooks and other legacy banking applications.

  • 2
  • 61

Financial Services Use Case: Protect IaaS Hybrid Cloud

Download our use case to learn how Palo Alto Networks can help your organization protect IaaS hybrid clouds in financial services.

  • 1
  • 223

Government Use Case: Decrypt SSL and SSH Traffic to Disrupt Attacker Communications and Theft

SSL-encrypted traffic is growing in government networks, resulting in multiple blind spots for security monitoring tools and creating an opportunity for attackers to hide malware. Many governments are considering or mandating the decryption of encrypted communications moving in and out of their networks. While traditional approaches favor dedicated SSL decryption appliances, these add latency, costs and increase time to resolution for security incidents. Download our use case “Decrypt SSL and SSH Traffic to Disrupt Attacker Communications and Theft” to learn how Palo Alto Networks Next-Generation Security Platform delivers an integrated approach to SSL decryption that streamlines security operations, improves network performance, and enables agencies to identify and prevent encrypted threats swiftly.

  • 0
  • 82

2017 Gartner Magic Quadrant Leader - It Just Feels Right

Gartner’s 2017 Magic Quadrant for Enterprise Network Firewalls has been released. Palo Alto Networks is proud to be positioned in the leader quadrant for the sixth straight year.

  • 0
  • 141

Security Reference Blueprint for Retail

This white paper outlines key security principles for modern retail networks and a framework that reduces operational demands on IT and security teams while improving security and control.

  • 0
  • 89

The "Patient Zero" Problem and the Need for Modern Endpoint Protection

This paper from IDC, a premier global provider of market intelligence, examines modern endpoint protection, describing how the evolution of malware has created a need for a modernized approach to endpoint protection.

  • 1
  • 2077

Next-Generation Cyber Risk Management

Since the release of the Cybersecurity Framework by the U.S. National Institute of Standards and Technology (NIST), organizations worldwide have implemented the framework to better understand and manage cyber risk. Download this white paper to explore the benefits of the CSF and how Palo Alto Networks Next-Generation Security Platform capabilities map to and fulfill CSF subcategories.

  • 0
  • 89

Streamline PCI Compliance With Next-Generation Security

Establishing, maintaining, and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for everyone in payment card processing—including merchants, processors, acquirers, issuers, and service providers, as well as companies that store, process or transmit cardholder data (CHD) and/or sensitive authentication data. With approximately three hundred individual requirements to address, organizations subject to the standard have their work cut out for them. This white paper will explain how Palo Alto Networks® Next Generation Security Platform allows PCI system operators to significantly enhance security and exceed PCI DSS requirements through segmentation and mitigating risks of malware and unpatched systems.

  • 2
  • 2598

PCI Use Case: Simplify PCI Compliance With Network Segmentation

Establishing, maintaining and demonstrating compliance with the Payment Card Industry Data Security Standard (PCI DSS) is a necessity for all entities involved in payment card processing – including merchants, processors, acquirers, issuers, and service providers, as well as all other entities that store, process or transmit cardholder data (CHD) and/or sensitive authentication data (SAD). For all system components included in or connected to the Cardholder Data Environment (CDE), organizations must comply with more than three hundred requirements. It is in every organization’s best interest, therefore, to take advantage of network segmentation provisions stated in the PCI DSS to effectively isolate their CDE and thereby decrease the amount of infrastructure that is considered in scope.

  • 0
  • 443

Protecting the Extended Perimeter with GlobalProtect Cloud Service

Your Perimeter Is Everywhere. The world you need to secure is undergoing tremendous transformation. Global expansion, mobile workforces and cloud computing are shifting the location of your applications, data and users. These changes introduce new opportunities for business, but they also create a set of cybersecurity risks. These tectonic shifts in location strain an organization’s ability to protect data and stop threats consistently. The mandate for security has not changed, but the ability to deliver protection at each location is at a crossroads. Many organizations, faced with the rising costs of extending the perimeter using conventional methods, are left with few other choices. These consequences place organizations at risk. It is important to understand where the risks lie to evaluate what must be done to bring security back into balance.

  • 0
  • 1323

Apply Network Segmentation in the Virtualized Data Center

Read how Palo Alto Networks applies network segmentation to increase security and protect applications and data in a virtualized data center.

  • 0
  • 125

Machine Learning and Endpoint Security

The most promising weapon in the endpoint security arsenal is machine learning. Read how it quickly learns, makes instant decisions and rapidly prevent threats.

  • 0
  • 481

How the Next-Generation Security Platform Contributes to GDPR Compliance

Palo Alto Networks Next-Generation Security Platform can help with security and data protection efforts related to GDPR compliance by securing personal data.

  • 0
  • 1098

Reducing the Business Risks of Cyberthreats

Your approach to cybersecurity can enable your business to innovate or introduce unnecessary risk. Consider reducing the business risks of cyberthreats.

  • 1
  • 263

Healthcare Use Case: Protecting SaaS-based Applications

Cloud-based SaaS applications like Box.com and Google Drive provide easy file sharing for hospital staff but also pose risks. Read on for details.

  • 0
  • 218

Comprehensive Data Security in the Cloud

This white paper outlines three steps organizations can follow to effectively secure business-critical data in the cloud.

  • 0
  • 333

Campus in the Cloud

Palo Alto Networks IT Campus in the Cloud approach reduces office build times and enables branch offices to leverage local internet and cloud services.

  • 0
  • 293

Rethink Your Strategy to Defeat Evasive Attacks

Understanding evasive malware and effective strategies for preventing this emerging threat type can protect your organization against financial, operational, legal, regulatory and compliance risks.

  • 2
  • 885

Next-Generation Security for Retail Environments

In a competitive and rapidly changing industry that’s continually targeted by cyberthreats, creating a secure digital foundation is critical to success. Read this platform brief for a concise summary of how Palo Alto Networks helps retailers secure customer data while thwarting cyberattacks, streamlining security operations, and granting appropriate network access to employees, customers, suppliers and partners.

  • 1
  • 802

Traps for SCADA

Learn why Palo Alto Networks Traps is ideal for securing SCADA/ICS environments providing superior protection with minimal disruptions.

  • 3
  • 1899
Displaying 1 to 30 of 155