Date

Displaying 1 to 30 of 266

Government use case: Maintain the integrity of election systems

Enable citizens to exercise their right to vote, preserve trust in the process, and meet recommendations and regulations for securing the vote
  • 0
  • 812

Bridging Security Gaps with Networks-to-Endpoint Integration

The typical enterprise uses an average of 30 security products, most of which from variety of vendors and typically do not integrate well and offer little information sharing…if any.
  • 0
  • 26

Securing Developer Environments on AWS

Download this whitepaper to learn how you can secure dev environments on AWS.
  • 0
  • 795

10 Things Your Next Firewall Must Do

This paper outlines the 10 key things your next firewall must do to secure your network and your business.
  • 2
  • 6397

Extended Application-Layer Visibility Across Multiple Mobile Network Peering Points

Palo Alto Networks Next-Generation Security Platform includes features that enhance application-layer protection and visibility across all network peering points.
  • 1
  • 540

Zero Trust: A Transformation Journey

Read how to apply the Zero Trust cybersecurity strategy through transformation to a prevention-based architecture. Included are technical capabilities as well as business outcomes for each level of transformation as well as tools to measure your capabilities as you progress through the transformation journey
  • 1
  • 240

Combine Network and Endpoint Security for Better Visibility, Protection, and Enforcement

This paper examines the changing threat landscape and highlights the importance of best-in-class endpoint protection working in lockstep with other security products to create coordinated and comprehensive enterprise security. Palo Alto Networks Traps advanced endpoint protection provides superior endpoint threat prevention as well as bridges the gap between endpoint security and network security, augmenting next-generation firewalls to provide stronger defense with fewer resources.
  • 0
  • 1056

Cybersecurity Survival Guide

Next-generation implies that new methods of processing and securing network traffic are being used to provide visibility and control over traffic, applications, and threats. Enterprise security deals with threat protection for large and complex organizations; while cybersecurity scales the vast landscape of the Internet riddled with vulnerabilities and viruses.
  • 3
  • 1170

Decryption: Why, Where and How

Learn where, when and how to decrypt – everything from people, processes and tools to best practices – to prevent threats and secure your business.
  • 0
  • 193

Security Platform for Healthcare Providers

Prevent successful cyberattacks on Healthcare systems and protect sensitive data
  • 7
  • 1869

Palo Alto Networks VM-Series Firewall Deployment on NSX SD-WAN Edge

Protect your NSX SD-WAN deployment using Palo Alto Networks VM-Series. Learn about how to take advantage of all of the protections of the platform using integration with VeloCloud, now part of VMware.
  • 0
  • 122

Palo Alto Networks and Medigate

Healthcare Device Identification, Classification, and Threat Prevention
  • 0
  • 91

How the Next-Generation Security Platform Contributes to GDPR Compliance

Palo Alto Networks Next-Generation Security Platform can help with security and data protection efforts related to GDPR compliance by securing personal data.
  • 1
  • 3549

A Smarter Approach for MSSPs

Security helps businesses increase productivity by safely enabling applications, cloud services, mobility, and the use of connected "things". However, many organizations lack the cybersecurity skills, automation, and resources needed to keep up with today's rapidly evolving security threats. This is driving demand for Managed Security Service Providers (MSSP's) to deliver security that helps their customers minimize their business risk, augment their IT security teams and secure their networks.
  • 0
  • 23

Cybersecurity for Government Platform Brief 

A strong cyber defense, agile to the needs of governments globally as well as to adversaries’ tactics and tool changes, is germane to the future. Palo Alto Networks meets the cybersecurity needs of its government customers by providing a future-proof platform with visibility, prevention and resilience – from the endpoint to the heart of the network, data center and cloud – and for all threat types for IT and OT networks.
  • 0
  • 879

Palo Alto Networks’ Security Operating Platform Integration with SilentDefense

True resilience for critical infrastructure and data centers against cyber and operational issues.
  • 0
  • 19

3 Requirements for Secure Digital Transformation

To secure digital transformation without slowing down the business requires an integrated approach – harnessing the agility of the cloud along with the power of automation and analytics – to simplify operations and bring about better security outcomes with less effort.
  • 0
  • 128

Cyberscurity for State and Provincial Governments

Overview of how state and provincial governments can secure network, endpoint, and cloud environments with the Security Operating Platform
  • 0
  • 335

The Security Platform for Managed Security Service Providers (MSSPs)

The world's leading MSSPs power profitable growth and high customer satisfaction with the Palo Alto Networks Next-Generation Security Platform.
  • 0
  • 983

PALO ALTO NETWORKS SOC2 CERTIFICATION

Palo Alto Networks® strives to protect our way of life in the digital age by safely enabling applications and ensuring that customer data is secure, everywhere. As a leading cybersecurity company, we are focused on both the security and privacy of our customers, and we have developed our Next-Generation Security Platform from the ground up to support both. Download this document to learn more on WildFire and Aperture SOC2 certification.
  • 2
  • 1348

Cyber Threat Report: Reconnaissance 2.0

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
  • 0
  • 209

Actionable Security Intelligence

This white paper describes how Palo Alto Network next-generation firewalls and Panorama help you get actionable security insights.
  • 27
  • 14318

Cybersecurity Reference Blueprint for Financial Services IT

Learn how financial institutions may prevent successful cyberattacks by incorporating various elements of the Palo Alto Networks security operating platform into their overall cybersecurity program.
  • 3
  • 1735

Securing the Unpatchable in Financial Institutions

There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue patches to remediate flaws, many financial institutions do not apply all available patches to their production environments. In addition, when systems or applications reach their end-of-support, they no longer receive vulnerability patches from their vendors. These two scenarios describe the conditions under which a system or application is considered "unpatchable." When patching or upgrading is no longer feasible, security professionals need to identify alternative ways to secure the unpatchable systems and applications to support their ongoing use in the environment.
  • 4
  • 440

Airline IT SECURITY REFERENCE BLUEPRINT

Get more info about Palo Alto Networks Security Operating Platform
  • 0
  • 142

Mitigating Risk In Australia’s Critical Infrastructure

Palo Alto Networks Security Operating Platform Supports Use of ASD Top 37 STRATEGIES TO MITIGATE CYBERSECURITY INCIDENTS
  • 0
  • 303

Look What's Riding your Network

A Deeper Look at Growing Threats to Mobile Networks and Subscribers
  • 1
  • 4328

Palo Alto Networks and VMware NSX SD-WAN by VeloCloud

Eliminate backhaul and deliver both assurance and security for enterprise and cloud applications over internet and hybrid-WAN
  • 0
  • 1394

Cybersecurity for Airline IT Networks and Systems

Sign up for a free Security Lifecycle Review. This non-disruptive process will help discover unknown applications, threats and bandwidth usage on your network, and define top risks.
  • 0
  • 58

Securing SAP Deployments on Azure

The benefits of Azure and the public cloud are well-known, so too are the challenges of protecting your SAP deployment from threats and data loss, potentially slowing cloud adoption. This whitepaper provides an overview of how the VM-Series can be used to mitigate those security challenges for your SAP deployments on Azure.
  • 0
  • 114
Displaying 1 to 30 of 266