Date

Displaying 1 to 30 of 337

Cortex XDR Endpoint Protection Overview

This paper provides a deeper look at the Cortex XDR agent features, functionality, and technical architecture.
  • 0

Public Cloud as Outsourcing for Financial Services

Read this white paper to learn some common areas of interest shared by financial regulators over public cloud use by financial institutions.
  • 0

Cortex XDR

Security teams face a dizzying array of threats, from ransomware and cyberespionage to fileless attacks and damaging data breaches. However, the biggest headache for many security analysts is not the endless number of risks that dominate news headlines but the frustrating, repetitive tasks they must perform every day as they triage incidents and attempt to whittle down an endless backlog of alerts.
  • 3
  • 1071

Security Reference Blueprint for K-12 Education IT

This reference blueprint suggests ways K-12 institutions can reduce cyber risks and protect operations, data and students with a consistent and coordinated approach to cybersecurity.
  • 1
  • 874

Top 5 Requirements for Effective Endpoint Protection

Attackers must complete a certain sequence of events, known as the attack lifecycle, to accomplish their objectives, whether stealing information or running ransomware. Nearly every attack relies on compromising an endpoint to succeed, and although most organizations have deployed endpoint protection, infections are still common.
  • 0

Palo Alto Networks & Claroty Integration Guide

Technology Partner, Integration, Integration guide, use case, deployment guide, tech partner, Claroty, IoT, ot.
  • 0

Enabling Secure Industrial Digital Transformation

This executive-level whitepaper from industrial automation market experts, ARC Advisory Group, covers the challenges industrial asset owner-operators will face as they embark on their OT digital transformation initiatives.
  • 0
  • 62

Federal Government Defense Security Reference Blueprint

This guide outlines the challenges Defense agencies face and methods they can use to integrate the Palo Alto Networks ecosystem into the Federal Enterprise Architecture (FEA) to fight modern threats, meet current and future security objectives, and improve cyber resilience and operations.
  • 0
  • 79

Palo Alto Networks & Area 1 Joint Solution Brief

Palo Alto Networks & Area 1 Joint Solution Brief
  • 0

Services Spotlight

Palo Alto Networks Recognized by J.D. Power and TSIA for Exceptional Performance in the Delivery of Support Services for the Third Consecutive Year
  • 0
  • 391

Cybersecurity reference blueprint for manufacturing

Attackers have developed an arsenal of tools and techniques to break into organizations’ networks and steal valuable information. This report reveals the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance. It also explains how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
  • 0
  • 88

Platform Brief for Manufacturing

Manufacturers are employing the industrial internet of things and other innovative technologies to produce quality goods efficiently. Read this platform brief for a summary of how Palo Alto Networks helps manufacturers compete in the global marketplace while streamlining security operations, protecting valuable data, and preventing new and known threats from impacting operations or uptime of corporate and ICS/SCADA networks.
  • 2
  • 1528

Network Visibility, Detection and Response Modern Analytics for Today’s Threats

451 Research's analysis of the network visibility and analytics your security operations team needs to effectively defend against sophisticated threats.
  • 1
  • 172

The 12 Most Critical Risks for Serverless Applications

In this detailed guide, the Cloud Security Alliance (CSA) classifies the potential risks for applications built on serverless architectures.
  • 2
  • 151

Palo Alto Networks & Aruba Networks Solution Overview

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 0

Palo Alto Networks & Splunk Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 0

Palo Alto Networks & Splunk Partnership At A Glance

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 2

Continuous Diagnostics and Mitigation (CDM) - at a Glance

This whitepaper describes how Palo Alto Networks provides an easy-to-use, cost-effective management environment that enables integrators and agencies to meet CDM requirements.
  • 0
  • 105

Palo Alto Networks & Boldon James Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 0

SWIFT Mandatory and Advisory Security Controls

Successful cyberattacks against a number of financial institutions across the globe from 2015-2018 have resulted in multiple instances of fraudulent fund transfers over the Society for Worldwide Interbank Financial Telecommunications, or SWIFT, network. As part of an effort to enhance the cybersecurity of the entire eco-system, members of SWIFT must annually self-attest to sixteen mandatory cybersecurity controls as of year-end 2017. In future years, non-compliance with these controls may result in notification to SWIFT counterparties and/or appropriate regulatory bodies. Furthermore, eleven advisory security controls are provided as best practices to further improve overall cyber hygiene across the SWIFT eco-system. No single vendor can provide complete compliance with the entire set of SWIFT mandatory and advisory controls. However, the Palo Alto Networks Security Operating Platform delivers the following: Support for nearly 75 percent of the SWIFT Customer Security Controls Framework, where various elements of the Security Operating Platform are able to address 12 of 16 mandatory controls and eight of 11 advisory controls. Definitive least-privileged access control and other essential security capabilities to effectively segment and protect the local SWIFT environment. Capabilities above and beyond the baseline specifications to more thoroughly protect your local SWIFT infrastructure and the rest of your organization’s computing environment from the latest unknown malware and advanced threats. By leveraging the Palo Alto Networks Security Operating Platform, financial institutions will be well on their way to complying with or exceeding the SWIFT mandatory and advisory controls. Beyond merely an exercise in compliance, the prevention philosophy behind the platform will improve a financial institutions overall cyber hygiene and provide better security outcomes for the organization. The result will be a more secure environment for your financial institution – one in which legitimate traffic is known and limited, with automated security enforcement to detect and address deviations. Future annual self-attestations to SWIFT will be much less stressful as your institution’s cybersecurity posture will be above and beyond their required baseline level.
  • 0
  • 4632

Security Reference Blueprint for Higher Education

The Security Reference Blueprint for Higher Education outlines security principles and a framework using the preventative capabilities of the Palo Alto Networks Next-Generation Security Platform. Using this blueprint enables education security and IT professionals to protect PII and IP data, maintain a high-performance, high-availability learning environment, and prepare to meet new and emerging technological challenges while reducing security threats.
  • 3
  • 899

Incident Response Reporting Template

With this template, you can summarize the entire incident with important measurement and recording metrics and more!
  • 0
  • 601

Supercharge your Security Operations Center

Download this whitepaper to discover best practices that enhance analyst's productivity and therefore reduces the organization’s risk.
  • 0
  • 103

Security Automation and Orchestration - The Human Perspective

Security Orchestration - like a conductor conducting a harmonious musical symphony. You need to make music. Not noise.
  • 0
  • 102

Palo Alto Networks & cPacket Joint Solution

Next-Generation Firewalls can provide detailed information on events or devices whose traffic they directly handle or access. This information is normally only related to the traffic flowing through the firewall itself, and traces generally need to be activated on demand as well as used with caution, so as not to affect firewall performance.
  • 0
  • 61

Palo Alto Networks & Boldon James Integration Guide

For technical details and to configure the integration between our two products, download this integration guide.
  • 0
  • 215

Government use case: Maintain the integrity of election systems

Enable citizens to exercise their right to vote, preserve trust in the process, and meet recommendations and regulations for securing the vote.
  • 0
  • 1124

MARS-E Executive Briefing

Making sense of MARS-E is geared towards State CIOs, Enterprise Architects, global system integrators (GSIs), and all Administering Entities (AEs) involved in the modernizing of state Medicaid, Integrated Eligibility, or Children’s Health Insurance Program (CHIP) systems
  • 0

Securing the Unpatchable in Financial Institutions

There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue patches to remediate flaws, many financial institutions do not apply all available patches to their production environments. In addition, when systems or applications reach their end-of-support, they no longer receive vulnerability patches from their vendors. These two scenarios describe the conditions under which a system or application is considered "unpatchable." When patching or upgrading is no longer feasible, security professionals need to identify alternative ways to secure the unpatchable systems and applications to support their ongoing use in the environment.
  • 6
  • 738

Federal Civilian Security Reference Blueprint

The Security Reference Blueprint for Federal Civilian Departments and Agencies helps the U.S. deliver on its mission and business objectives to safely and securely render services to the American public, while advancing the Nation's agenda.
  • 2
  • 80
Displaying 1 to 30 of 337