Date

Displaying 1 to 30 of 186

Applying VLAN Insertion in ICS/SCADA

Case studies on the Target® and recent Ukraine electrical grid attacks indicate that these attacks were containable or preventable with proper network segmentation.

  • 0
  • 410

Defining the 21st Century Cybersecurity Protection Platform for ICS

In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.

  • 2
  • 3967

Technical White Paper on VMware NSX and Palo Alto Networks VM-Series Integration

This technical document provides details of the VMware NSX and Palo Alto Networks integration, including descriptions of the components of the solution, and key use cases.

  • 4
  • 7187

VM-Series On Google Cloud Deployment Guidelines

Organizations are adopting Google® Cloud Platform to take advantage of the same technologies that drive common Google services. Many business initiatives, such as big data, analytics and machine learning, deployed on GCP allow you to leverage contextual data collected from billions of search engine data points. The power behind GCP, combined with agility and a global footprint, help you quickly deploy enterprise-class applications and services.

  • 0
  • 4118

HOW TO SECURE YOUR BUSINESS IN A MULTI-CLOUD WORLD

For many organizations, the cloud has become the sole route to market for new application deployment. It affords greater agility and scalability, higher performance, and faster access to innovative technologies, all of which help a business gain a competitive edge. As a result, data and applications now reside in a multitude of cloud environments, including private and public clouds, spanning infrastructure, platform and software as a service – IaaS, PaaS and SaaS, respectively.

  • 0
  • 22

How to Secure Your Business in a Multi Cloud World

For many organizations, the cloud has become the sole route to market for new application deployment. As a result, data and applications now reside in a multitude of cloud environments, including private and public clouds, spanning infrastructure, platform and software as a service – IaaS, PaaS and SaaS, respectively. Confidently accelerating the move to the cloud requires consistent, automated protections across multi-cloud deployments that prevent data loss and business downtime. Read this paper to learn about an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, by enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments.

  • 0
  • 2559

VM-Series for NSX: Implementation and Traffic Steering Guidelines

In today’s growing data center threat landscape, an effective cybersecurity strategy is imperative for software-defined data centers. VMware® and Palo Alto Networks® have partnered on a solution that leverages NSX™ to enable provisioning and seamless insertion of VM-Series next-generation firewall and advanced threat prevention in your software-defined data centers. Download this white paper to learn more about design considerations, recommendations and best practices for traffic steering while deploying VMware NSX and Palo Alto Networks VM-Series integrated solution.

  • 2
  • 906

Citrix NetScaler and Palo Alto Networks

This paper explains why combining two best-in-class solutions—the Citrix NetScaler application delivery controller (ADC) and the Palo Alto Networks Next-Generation Firewall (NGFW)—is the best approach for today’s enterprises to build a network capable of fully addressing cloud requirements for secure application delivery.

  • 0
  • 12

Aviation IT Security Reference Blueprint

Register for our NGFW workshop.

  • 0
  • 20

Traps Advanced Endpoint Protection Named a Strong Performer by Forrester Research

Traps Advanced Endpoint Protection offering was recognized by Forrester Research as a Strong Performer among endpoint security suite providers. Read the report.

  • 0
  • 2241

Palo Alto Networks : Addressing the Cybersecurity Skills Shortage with Behavioral Analytics

Overworked security staff, manual processes, and uncoordinated security tools can hamper security operations and tilt the odds in favor of cyber attacker

  • 0
  • 346

Simplify PCI Compliance With Network Segmentation for airlines

PCI compliancy is mandatory for the airlines, the scope extends to all system components that are included in or connected to the Cardholder Data Environment (CDE).

  • 0
  • 104

The CISO Definitive Guide for Picking the NGFW That Works for You

It seems that nearly every day a major trusted brand is reporting a breach. The loss and impact felt by companies and individuals alike are significant, and IDC expects that lost business will be more tangible over time. A recent IDC survey of 2,500 consumers found that over three-quarters of respondents would be willing to switch providers if their data was lost to criminals. The size and scope of breaches is mind numbing, and CEOs, board members, and everyday citizens continue to ask, "How do we get better?"

  • 0
  • 81

App-IDs for Industrial Control Systems and SCADA Networks

View a listing of the application identifiers, or App-IDs, supported by the Palo Alto Networks Next-Generation Firewall for Industrial Control Systems (ICS).

  • 0
  • 756

Security Value Map

Download the report to read more about NSS Labs recommendation of Palo Alto Networks

  • 0
  • 137

Building a Scalable GlobalProtect Deployment

Protect your mobile workforce and network from internet-borne threats with a scalable GlobalProtect deployment.

  • 0
  • 440

Navigating Cybersecurity Challenges in Financial Services

Download the whitepaper to read more about how our next-generation security approach is better able to protect the highly targeted financial services industry.

  • 1
  • 195

Electric Transmission Data Networks Use Case White Paper

This use case provides a high-level reference design for network security in electric transmission data networks.

  • 0
  • 399

6 Key Security Requirements for Next–Generation Mobile Networks

A new security approach is needed focusing on prevention, application-layer visibility, cost efficiency and automation.

  • 5
  • 501

Rethink Mobile Security Monetization

This paper for mobile network operators provides a framework for value and revenue opportunities across the entire subscriber base.

  • 2
  • 250

Reducing the Business Risks of Cyberthreats

Your approach to cybersecurity can enable your business to innovate or introduce unnecessary risk. Consider reducing the business risks of cyberthreats.

  • 1
  • 392

Prevent Credential Theft in Healthcare

Theft and abuse of stolen passwords is one of the oldest attacks in the book, yet it remains highly effective. Adversaries can use stolen credentials to impersonate valid users, allowing them to bypass the entire attack lifecycle, move uninterrupted throughout their target organization’s network and shift to the abuse of credentials from within. You can prevent credential theft with Palo Alto Networks Next-Generation Security Platform by stopping credential leakage, blocking access to phishing sites and enforcing multi-factor authentication security policy in the network.

  • 0
  • 736

Securing the Unpatchable in Financial Services

This case study discusses the security, risk and compliance ramifications of operating unpatchable systems, such as Windows® XP and Windows Server 2003. In financial services, these unsupported operating systems may still be found in ATMs and aging systems that support check scanners, printers for passbooks (bankbooks), ATM cards, on-demand checkbooks and other legacy banking applications.

  • 2
  • 137

Secure and Protect Medical Devices in Healthcare

Read this whitepaper to understand how Palo Alto Networks security platform provides best-in-class security for medical devices in a healthcare environment.

  • 2
  • 338

Fundamentals of Secure Cloud Adoption

The challenge of moving to the cloud is how to protect applications and data without adding complexity or cost. Read Securely Enabling Cloud Adoption for solutions.

  • 0
  • 408

10 Things to Test In Your Future NGFW

Find out what network admins need to know to improve perimeter defense

  • 0
  • 51

Architecting the Modern Campus Network

Learn on the promise of delivering a more secure campus network that is adaptive to threats, improves user experience, and is easier to configure and manage.

  • 0
  • 697

Automotive Security Reference Blueprint

Please register for a UTD on our Next Generation Firewall

  • 0
  • 26

Automating VM-Series Deployments with Terraform and Ansible

Download this whitepaper and get started with Terraform and Ansible.

  • 0
  • 141

Extending Networks Into the AWS Cloud

Learn how Palo Alto Networks and Accenture help you migrate to the cloud.

  • 1
  • 54
Displaying 1 to 30 of 186