Date

Displaying 1 to 30 of 157

Build Consistent Security Throughout NFV Evolution

Download the use case for more information on NFV
  • 0
  • 8

Enhance your Windows 10 desktop security with Palo Alto Networks Advanced Endpoint Protection

The limitations of the built-in security features leave systems still highly vulnerable to advanced and unknown threats, also known as zero-day threats. To protect these systems and to fully protect your Windows 10 machines you need to augment the inbuilt security with security tools that can protect against attacks like exploits and ransomware.
  • 0
  • 47

Cybersecurity for Retail

Prevent successful cyberattacks on retail stores, secure customer data, maintain PCI compliance, simplify retail security operations
  • 1
  • 1000

Guide to Securing Microsoft Office 365 for the Enterprise

This paper describes how the Palo Alto Networks Security Operating platform secures your data in Microsoft Office 365 and other cloud applications.
  • 1
  • 87

App-IDs for Industrial Control Systems and SCADA Networks

View a listing of the application identifiers, or App-IDs, supported by the Palo Alto Networks Next-Generation Firewall for Industrial Control Systems (ICS).
  • 2
  • 1243

Cybersecurity Reference Blueprint for Building Management/Automation Systems

Learn how to protect your Building Management Systems for cyberthreats. Register to access the cybersecurity reference blueprint for BMS/BAS.
  • 0
  • 15

Electric Transmission Data Networks Use Case White Paper

This use case provides a high-level reference design for network security in electric transmission data networks.
  • 1
  • 536

How to Secure Your Business in a Multi-Cloud World

This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments.
  • 2
  • 1057

2018 NSS Labs Advanced Endpoint Protection Report

Palo Alto Networks advanced endpoint protect Traps achieved the rating of “Recommend” in the 2018 NSS Labs Advanced Endpoint Protection (AEP) Test. This test aims to determine how effectively the AEP product can protect against a threat, regardless of the infection vector or method of obfuscation. The AEP test evaluated several vendors ability to detect, prevent, continuously monitor and take action against malware, exploits, evasions and blended threats.
  • 3
  • 2367

EU Data Protection Compliance When Securing SaaS Applications

The purpose of this white paper is to clarify how Networks Aperture™ SaaS security service can be used in compliance with EU data protection requirements, including the upcoming EU General Data Protection Regulation.
  • 0
  • 762

Look What's Riding your Network

A Deeper Look at Growing Threats to Mobile Networks and Subscribers
  • 1
  • 4228

Applying VLAN Insertion in ICS/SCADA

Case studies on the Target® and recent Ukraine electrical grid attacks indicate that these attacks were containable or preventable with proper network segmentation.
  • 1
  • 693

Defining the 21st Century Cybersecurity Protection Platform for ICS

In this paper Mario Chiock, Cybersecurity & Disruptive Technology Executive Adviser and Del Rodillas Senior Manager, SCADA and Industrial Controls Cybersecurity go through the nine core capabilities that define this 21st century security platform for industrial control systems.
  • 4
  • 4457

AWS Reference Architecture

This guide provides a foundation for securing network infrastructure using Palo Alto Networks® VMSeries virtualized next generation firewalls within the Amazon Web Services (AWS) public cloud.
  • 4
  • 4002

Azure Reference Architecture

This document provides architectural guidance for solution architects and engineers who are familiar with the next-generation firewall but not Azure.
  • 2
  • 3402

VM-Series On Google Cloud Deployment Guidelines

Organizations are adopting Google® Cloud Platform to take advantage of the same technologies that drive common Google services. Many business initiatives, such as big data, analytics and machine learning, deployed on GCP allow you to leverage contextual data collected from billions of search engine data points. The power behind GCP, combined with agility and a global footprint, help you quickly deploy enterprise-class applications and services.
  • 1
  • 5005

Technical White Paper on VMware NSX and Palo Alto Networks VM-Series Integration

This technical document provides details of the VMware NSX and Palo Alto Networks integration, including descriptions of the components of the solution, and key use cases.
  • 4
  • 8326

Citrix NetScaler and Palo Alto Networks

This paper explains why combining two best-in-class solutions—the Citrix NetScaler application delivery controller (ADC) and the Palo Alto Networks Next-Generation Firewall (NGFW)—is the best approach for today’s enterprises to build a network capable of fully addressing cloud requirements for secure application delivery.
  • 0
  • 112

VM-Series for NSX: Implementation and Traffic Steering Guidelines

In today’s growing data center threat landscape, an effective cybersecurity strategy is imperative for software-defined data centers. VMware® and Palo Alto Networks® have partnered on a solution that leverages NSX™ to enable provisioning and seamless insertion of VM-Series next-generation firewall and advanced threat prevention in your software-defined data centers. Download this white paper to learn more about design considerations, recommendations and best practices for traffic steering while deploying VMware NSX and Palo Alto Networks VM-Series integrated solution.
  • 2
  • 1134

The Attacker’s Mindset: Insights into real-world attack campaigns

This paper examines the attacker’s mindset, first providing insights into the motivations and high-level methods shaping today’s threat landscape and accelerating the need for endpoint security technologies capable of preventing – not just detecting – both known and unknown threats.
  • 0
  • 1046

Aviation IT Security Reference Blueprint

Register for our NGFW workshop.
  • 0
  • 65

Palo Alto Networks : Addressing the Cybersecurity Skills Shortage with Behavioral Analytics

Overworked security staff, manual processes, and uncoordinated security tools can hamper security operations and tilt the odds in favor of cyber attacker
  • 0
  • 911

Simplify PCI Compliance With Network Segmentation for airlines

PCI compliancy is mandatory for the airlines, the scope extends to all system components that are included in or connected to the Cardholder Data Environment (CDE).
  • 0
  • 164

The CISO Definitive Guide for Picking the NGFW That Works for You

It seems that nearly every day a major trusted brand is reporting a breach. The loss and impact felt by companies and individuals alike are significant, and IDC expects that lost business will be more tangible over time. A recent IDC survey of 2,500 consumers found that over three-quarters of respondents would be willing to switch providers if their data was lost to criminals. The size and scope of breaches is mind numbing, and CEOs, board members, and everyday citizens continue to ask, "How do we get better?"
  • 0
  • 191

Security Value Map

Download the report to read more about NSS Labs recommendation of Palo Alto Networks
  • 0
  • 352

Building a Scalable GlobalProtect Deployment

Protect your mobile workforce and network from internet-borne threats with a scalable GlobalProtect deployment.
  • 0
  • 517

Navigating Cybersecurity Challenges in Financial Services

Download the whitepaper to read more about how our next-generation security approach is better able to protect the highly targeted financial services industry.
  • 1
  • 323

6 Key Security Requirements for Next–Generation Mobile Networks

A new security approach is needed focusing on prevention, application-layer visibility, cost efficiency and automation.
  • 5
  • 593

Rethink Mobile Security Monetization

This paper for mobile network operators provides a framework for value and revenue opportunities across the entire subscriber base.
  • 2
  • 315

Reducing the Business Risks of Cyberthreats

Your approach to cybersecurity can enable your business to innovate or introduce unnecessary risk. Consider reducing the business risks of cyberthreats.
  • 1
  • 527
Displaying 1 to 30 of 157