Date

Displaying 1 - 30 of 372

White Paper

Stop Attackers from Using DNS Against You

Any modern organization requires the Domain Name System (DNS) to run its business, regardless of industry, location, size, or products. DNS is a protocol that translates user-friendly domain names, such as www.paloaltonetworks.com, into machine usable IP addresses—in this case, 199.167.52.137. Without DNS, we’d have to memorize random strings of numbers, which our brains aren’t well equipped to do. DNS is fundamental to every single modern organization, all over the world. Network operators cannot block DNS traffic, and firewalls have to let it through. Networks need DNS to function properly.

White Paper

Palo Alto Networks Prisma Access and Cradlepoint NetCloud Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.

White Paper

Alkira and Palo Alto Networks Integration Guide

For technical details and to configure the integration between our two products, download this integration guide.

White Paper

Is Palo Alto Networks a Processor or Controller of Customer Data? Both!

Learn more about Palo Alto Networks' processing of customer data as a data controller.

White Paper

MITRE ATT&CK Round 2

See Which EDR Solution Is Right for Your Organization

White Paper

Palo Alto Networks and Alkira Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.

White Paper

Automated Global Secure Access

Coordinate remote access for your global workforce and automate incident monitoring with Prisma Access and Cortex XSOAR.

White Paper

Protecting Organizations in a World of DoH and DoT

Palo Alto Networks security experts provide an in-depth look into the risks, visibility and control of DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) traffic.

White Paper

5 Critical Mistakes When Evaluating A Next-Generation Firewall

NGFW Mistakes, Buying Myths, NGFW Evaluation, How to choose NGFW, 5 Mistakes to Avoid

White Paper

Decryption: Why, Where and How

Learn where, when and how to decrypt – everything from people, processes and tools to best practices – to prevent threats and secure your business.

Other

Palo Alto Networks IoT Security Report

As organizational reliance on IoT devices is becoming ubiquitous, the potential consequences of compromise stemming from insecure IoT devices can be financially crippling for entities of all sizes. This scenario has resulted in corporations slowly recognizing that IoT cybersecurity is an essential investment in long-term operational sustainability.

White Paper

Prisma Access Service in China

This brief document describes the availability of Prisma Access for our customers in China

White Paper

The State of 2020 Security Operations

Get your copy of The State of 2020 Security Operations to learn more about today’s security operations trends and how you can leverage XDR to optimize your SOC.

White Paper

Measuring the ROIof an Incident Response Platform

This ROI white paper covers the challenges of implementing an incident response program and how automation can help solve these challengesThis ROI white paper covers the challenges of implementing an incident response program and how automation can help solve these challenges

White Paper

Security Reference Blueprint for Healthcare IT

Healthcare security reference blueprint

White Paper

Palo Alto Networks NGFW & PingID MFA Captive Portal Integration Guide

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.

White Paper

Cybersecurity Academy

Learn about the Palo Alto Networks Cybersecurity Academy Program

Book

Navigating the SaaS Security Jungle: How you can better protect your applications, data, and users

Learn about the challenges and solutions organizations can take to securing SaaS applications, users and data in this ebook.

White Paper

Palo Alto Networks & Okta Integration Guide

For technical details and to configure the integration between our two products, download this integration guide.

White Paper

Palo Alto Networks and Skybox Integration Guide

For technical details and to configure the integration between our two products, download this integration guide.

White Paper

Palo Alto Networks & Securonix Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.

White Paper

SOC Automation for MSSPs with Cortex XSOAR

SOC Automation for MSSPs with Cortex XSOAR

White Paper

Palo Alto Networks Global Protect & Ping Identity RADIUS Integration Guide

For technical details and to configure the integration between our two products, download this integration guide.

White Paper

Government Use Case: Network Security Consolidation

As Governments adopt digital technologies – employee remote access, citizen self-service, SaaS, cloud, and more – these same technologies introduce new points where the network can be infiltrated, and new valuable data that must be secured. The result was a cyber security arms race where new threats were countered with new security point products. Today, governments are consolidating security appliances and functions to gain better visibility and use scarce cybersecurity professionals wisely. Read this use case to discover • The advantages of a platform approach to network security consolidation. • Best practices for deployment. • How a government agency eliminated 10 security appliances at every location, simplifying compliance, management and reporting while improving security.

White Paper

Platform Brief for Manufacturing

Manufacturers are employing the industrial internet of things and other innovative technologies to produce quality goods efficiently. Read this platform brief for a summary of how Palo Alto Networks helps manufacturers compete in the global marketplace while streamlining security operations, protecting valuable data, and preventing new and known threats from impacting operations or uptime of corporate and ICS/SCADA networks.

White Paper

MSSP Phishing Incident Response with Cortex XSOAR

Optimizing Phishing Incident Response with Cortex XSOAR

White Paper

Securing Mobile Network Infrastructures: The Need for Constant Real-Time Visibility and Enforcement

Mobile Network Operators (MNOs) and Internet Service Providers (ISPs) need to have constant real-time visibility across traffic passing through their networks and be able to detect and stop cybersecurity threats within that traffic in real-time.

White Paper

5 Major Security Threats: And How to Stop Them

This paper looks at five of the latest security threats and explains how Palo Alto Networks tools can help keep your organization safe.

White Paper

Optimize Vulnerability Management with Cortex XSOAR

Optimize Vulnerability Management with Cortex XSOAR

White Paper

Palo Alto Networks NGFW and Saasyan Solution Brief

To learn more about the key benefits of implementing this integration and sample use cases, download the solution brief.
Displaying 1 - 30 of 372