Displaying 1 to 30 of 165

3 Requirements for Secure Digital Transformation

To secure digital transformation without slowing down the business requires an integrated approach – harnessing the agility of the cloud along with the power of automation and analytics – to simplify operations and bring about better security outcomes with less effort.
  • 0
  • 32

Cyber Threat Report: Reconnaissance 2.0

Learn the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance, as well as how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
  • 0
  • 84

Actionable Security Intelligence

This white paper describes how Palo Alto Network next-generation firewalls and Panorama help you get actionable security insights.
  • 26
  • 13601

Cybersecurity Reference Blueprint for Financial Services IT

Learn how financial institutions may prevent successful cyberattacks by incorporating various elements of the Palo Alto Networks security operating platform into their overall cybersecurity program.
  • 2
  • 1468

Securing the Unpatchable in Financial Services

Learn how unpatched and even end-of-support financial industry systems and devices may be secured with advanced endpoint protection against both malware and exploits.
  • 3
  • 342


Get more info about Palo Alto Networks Security Operating Platform
  • 0
  • 91

Mitigating Risk In Australia’s Critical Infrastructure

Palo Alto Networks Security Operating Platform Supports Use of ASD Top 37 STRATEGIES TO MITIGATE CYBERSECURITY INCIDENTS
  • 0
  • 89

Look What's Riding your Network

A Deeper Look at Growing Threats to Mobile Networks and Subscribers
  • 1
  • 4287

Securing SAP Deployments on Azure

This whitepaper provides an overview of how the VM-Series can be used to mitigate those security challenges for your SAP deployments on Azure.
  • 0
  • 64

Look What’s Riding your Network – Mobile Network Visibility for MSSP Customers

Download the MSSP Mobile Network Visibility report
  • 0
  • 52

Build Consistent Security Throughout NFV Evolution

Download the use case for more information on NFV
  • 0
  • 66

12 Best Practices to Make Your AWS Configuration More Secure

Amazon® Web Services has been an advocate for strong cloud security since it launched in 2006. AWS® and its customers employ a shared responsibility model that distributes security roles between the provider and customer. As a public cloud vendor, AWS owns the infrastructure, physical network and hypervisor. The enterprise owns the workload operating system, apps, virtual network, access to their tenant environment/account and the data.
  • 0
  • 51

Evident at Work: Continuous Security & Compliance in the Cloud

Evident from Palo Alto Networks® works with InfoSec and DevOps professionals of all levels, across every industry, to make cloud infrastructure security and compliance easier. Every organization struggles with the challenges of cloud security, such as threat detection, misconfiguration management, risk remediation and compliance with industry standards.
  • 0
  • 3104

The Six Essentials for DevOps Excellence

Moving at the speed of DevOps and digital transformation raises the concern that costly mistakes might happen. The worry is that as processes are trimmed or skipped, and decisions are done rapidly and in an environment that embraces agility, compromises and security gaffes will be made. Unfortunately, this is what appears to be happening in many organizations: a recent report from HPE concluded that while DevOps teams and automation should improve application security over time, most organizations are not currently paying enough attention to security.
  • 0
  • 25

Enhance your Windows 10 desktop security with Palo Alto Networks Advanced Endpoint Protection

The limitations of the built-in security features leave systems still highly vulnerable to advanced and unknown threats, also known as zero-day threats. To protect these systems and to fully protect your Windows 10 machines you need to augment the inbuilt security with security tools that can protect against attacks like exploits and ransomware.
  • 0
  • 121

Cybersecurity for Retail

Prevent successful cyberattacks on retail stores, secure customer data, maintain PCI compliance, simplify retail security operations
  • 1
  • 1092

Guide to Securing Microsoft Office 365 for the Enterprise

This paper describes how the Palo Alto Networks Security Operating platform secures your data in Microsoft Office 365 and other cloud applications.
  • 3
  • 513

App-IDs for Industrial Control Systems and SCADA Networks

View a listing of the application identifiers, or App-IDs, supported by the Palo Alto Networks Next-Generation Firewall for Industrial Control Systems (ICS).
  • 2
  • 1436

Cybersecurity Reference Blueprint for Building Management/Automation Systems

Learn how to protect your Building Management Systems for cyberthreats. Register to access the cybersecurity reference blueprint for BMS/BAS.
  • 0
  • 59

Electric Transmission Data Networks Use Case White Paper

This use case provides a high-level reference design for network security in electric transmission data networks.
  • 1
  • 588

How to Secure Your Business in a Multi-Cloud World

This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments.
  • 2
  • 2074

2018 NSS Labs Advanced Endpoint Protection Report

Palo Alto Networks advanced endpoint protect Traps achieved the rating of “Recommend” in the 2018 NSS Labs Advanced Endpoint Protection (AEP) Test. This test aims to determine how effectively the AEP product can protect against a threat, regardless of the infection vector or method of obfuscation. The AEP test evaluated several vendors ability to detect, prevent, continuously monitor and take action against malware, exploits, evasions and blended threats.
  • 3
  • 4065

EU Data Protection Compliance When Securing SaaS Applications

The purpose of this white paper is to clarify how Networks Aperture™ SaaS security service can be used in compliance with EU data protection requirements, including the upcoming EU General Data Protection Regulation.
  • 0
  • 882

Applying VLAN Insertion in ICS/SCADA

Case studies on the Target® and recent Ukraine electrical grid attacks indicate that these attacks were containable or preventable with proper network segmentation.
  • 1
  • 810

Defining the 21st Century Cybersecurity Protection Platform for ICS

In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.
  • 4
  • 4587

AWS Reference Architecture

This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud.
  • 4
  • 5602

Azure Reference Architecture

This document provides architectural guidance for solution architects and engineers who are familiar with the next-generation firewall but not Azure.
  • 2
  • 4769

Technical White Paper on VMware NSX and Palo Alto Networks VM-Series Integration

This technical document provides details of the VMware NSX and Palo Alto Networks integration, including descriptions of the components of the solution, and key use cases.
  • 4
  • 8792

VM-Series On Google Cloud Deployment Guidelines

Organizations are adopting Google® Cloud Platform to take advantage of the same technologies that drive common Google services. Many business initiatives, such as big data, analytics and machine learning, deployed on GCP allow you to leverage contextual data collected from billions of search engine data points. The power behind GCP, combined with agility and a global footprint, help you quickly deploy enterprise-class applications and services.
  • 2
  • 6634

VM-Series for NSX: Implementation and Traffic Steering Guidelines

In today’s growing data center threat landscape, an effective cybersecurity strategy is imperative for software-defined data centers. VMware® and Palo Alto Networks® have partnered on a solution that leverages NSX™ to enable provisioning and seamless insertion of VM-Series next-generation firewall and advanced threat prevention in your software-defined data centers. Download this white paper to learn more about design considerations, recommendations and best practices for traffic steering while deploying VMware NSX and Palo Alto Networks VM-Series integrated solution.
  • 2
  • 1275
Displaying 1 to 30 of 165