Date

Displaying 1 to 30 of 315

Securing the Unpatchable in Financial Institutions

There are no flawless software systems or applications. When flaws result in security vulnerabilities, threat actors exploit them to compromise those systems and applications and, by extension, the endpoints on which they reside. Although software vendors issue patches to remediate flaws, many financial institutions do not apply all available patches to their production environments. In addition, when systems or applications reach their end-of-support, they no longer receive vulnerability patches from their vendors. These two scenarios describe the conditions under which a system or application is considered "unpatchable." When patching or upgrading is no longer feasible, security professionals need to identify alternative ways to secure the unpatchable systems and applications to support their ongoing use in the environment.
  • 6
  • 659

Federal Civilian Security Reference Blueprint

The Security Reference Blueprint for Federal Civilian Departments and Agencies helps the U.S. deliver on its mission and business objectives to safely and securely render services to the American public, while advancing the Nation's agenda.
  • 0

Extended Application-Layer Visibility Across Multiple Mobile Network Peering Points

Palo Alto Networks Next-Generation Security Platform includes features that enhance application-layer protection and visibility across all network peering points.
  • 2
  • 744

Security Operating Platform Executive Summary

Provides a quick executive overview of the Palo Alto Networks Security Operating Platform, for securing the enterprise, securing the cloud and securing the future.
  • 1
  • 144

Three Use Cases for Securing a Hybrid Data Center

Securing the modern, hybrid data center requires a uniform approach across physical, virtualized, and cloud environments. The key is to gain granular visibility, control, and consistent threat protection in your hybrid data center without added complexity.
  • 1

Palo Alto Networks & Mnemonic Integration Guide

For technical details and to configure the integration between our two products, download this integration guide.
  • 0

Palo Alto Networks & ATAR Labs Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 0

Palo Alto Networks & Mnemonic Joint Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 0

Palo Alto Networks & ATAR Labs Integration Guide

For technical details and to configure the integration between our two products, download this integration guide.
  • 0

Securing Virtual Desktop Infrastructure (VDI) with Traps

How traps eliminate the challenges a traditional endpoint solution introduces in a virtual environment
  • 0
  • 351

Palo Alto Networks VM-Series & Citrix SD-WAN Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 0

Palo Alto Networks VM-Series and Citrix SD-WAN Integration Guide

For technical details and to configure the integration between our two products, download this integration guide.
  • 0

Palo Alto Networks NGFW & AttackIQ Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 0

The Value of Certifications

This whitepaper describes the need for cybersecurity certifications, the value companies, and cybersecurity professionals gain when attaining cybersecurity certifications. Also, describes the different Palo Alto Networks Certifications available with resources links.
  • 2
  • 102

Palo Alto Networks & Vectra Networks

Palo Alto Networks and Vectra Networks provide our customers with increased visibility and synchronized protection to effectively combat today’s advanced threats.
  • 0
  • 866

Applying Zero Trust to Cloud Environments

This whitepaper details how establishing a Zero Trust strategy will better protect your growing organization for the long-term.
  • 0
  • 78

Palo Alto Networks & BackBox Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
  • 0

Platform Brief for Manufacturing

Manufacturers are employing the industrial internet of things and other innovative technologies to produce quality goods efficiently. Read this platform brief for a summary of how Palo Alto Networks helps manufacturers compete in the global marketplace while streamlining security operations, protecting valuable data, and preventing new and known threats from impacting operations or uptime of corporate and ICS/SCADA networks.
  • 2
  • 1466

Maximize the ROI of Detection and Response

Download this white paper to learn how to maximize the ROI and cut the cost of detection and response.
  • 1
  • 181

Traps Technical Overview

Most organizations deploy a number of security products to protect their endpoints, including one or more traditional antivirus solutions. Nevertheless, cyber breaches continue to increase in frequency, variety and sophistication. Faced with the rapidly changing threat landscape, current endpoint security solutions and antivirus can no longer prevent security breaches on the endpoint. Palo Alto Networks® Traps™ advanced endpoint protection replaces traditional antivirus with a unique combination of the most effective, purpose-built, malware and exploit prevention methods that pre-emptively block known and unknown threats from compromising a system.
Santa Clara, CA
  • 19
  • 46902

Secure Transformation: Replacing Remote Access VPN with Prisma Access

This solution brief provides an overview for using GlobalProtect Cloud Service as remote access VPN.
  • 1
  • 337

Securing SD-WAN with the Palo Alto Networks Next-Generation Security Platform

Protect your SD-WAN deployment using Prisma Access
  • 0
  • 8567

How to Pick a Winner in EDR

The endpoint security marketplace is crowded with vendors claiming to have supe-rior capabilities. Cutting through all the marketing and sales pitches to understand how these products perform isn’t easy. Luckily, The MITRE Corporation conducted an independent test of the detection and investigation capabilities of leading end-point detection and response (EDR) products against real-world attack sequences. We’ll break down MITRE’s methodology, the results, and what it all means for your organization as you assess your current and future endpoint security toolkit.
  • 1
  • 295

Electric Transmission Data Networks Use Case White Paper

Read this use case white paper based on real world designs to learn: How to better secure your Electric Transmission Data Networks from advanced cyberthreats How to more efficiently and comprehensively address your NERC CIP compliance obligations
  • 1
  • 810

Government Use Case: Network Security Consolidation

As Governments adopt digital technologies – employee remote access, citizen self-service, SaaS, cloud, and more – these same technologies introduce new points where the network can be infiltrated, and new valuable data that must be secured. The result was a cyber security arms race where new threats were countered with new security point products. Today, governments are consolidating security appliances and functions to gain better visibility and use scarce cybersecurity professionals wisely. Read this use case to discover • The advantages of a platform approach to network security consolidation. • Best practices for deployment. • How a government agency eliminated 10 security appliances at every location, simplifying compliance, management and reporting while improving security.
  • 6
  • 547

Palo Alto Networks’ Security Operating Platform Integration with SilentDefense

True resilience for critical infrastructure and data centers against cyber and operational issues.
  • 4
  • 157

12 Best Practices to Enhance the Security of Your AWS Configurations

Amazon® Web Services has been an advocate for strong cloud security since it launched in 2006. AWS® and its customers employ a shared responsibility model that distributes security roles between the provider and customer. As a public cloud vendor, AWS owns the infrastructure, physical network and hypervisor. The enterprise owns the workload operating system, apps, virtual network, access to their tenant environment/account and the data.
  • 0
  • 687

Secure the Cloud: Cloud-Enabled Mobile Workforce

With cloud applications, your organization needs more than remote access VPN. Find out how to secure the cloud-enabled mobile workforce with Prisma Access.
  • 1
  • 579

Safely Enable Your SaaS Applications

The appeal of SaaS applications, such as Office 365®, G Suite, Box and Salesforce® is growing, but so are the hidden threats in SaaS offerings: costly data leaks, regulatory noncompliance, malware propagation and so on. This paper covers how Palo Alto Networks Security Operating Platform offers inline and API-based cloud access security broker or CASB capabilities that work together to minimize the wide range of cloud risks.
  • 0
  • 2357

Prisma Cloud Threat Protection

The dynamic nature of public cloud environments requires security operations teams to adapt and embrace a new approach to securing the cloud. Threat assessment and mitigation are significantly impacted due to ephemeral cloud environments, decentralized management models, and distributed data across multi-cloud deployments. Threat prevention for the cloud needs to be built around the principles of attack surface reduction through segmentation and prevention controls, advanced threat detection measures built around user, network and host activity monitoring and behavioral baselines, and rapid response through automated remediation.
  • 0
  • 130
Displaying 1 to 30 of 315