Displaying 1 to 30 of 173

Decryption: Why, Where and How

Learn where, when and how to decrypt – everything from people, processes and tools to best practices – to prevent threats and secure your business.
  • 0
  • 18

Cloud Security and Compliance for Dummies

The new “Cloud Security & Compliance For Dummies®” will help you with what you need to move to the cloud with confidence.
  • 0
  • 39

Government Use Case: Protect Endpoints

Read this use case for a real-world example of how a civilian government agency chose Palo Alto Networks Traps advanced endpoint protection to secure up to 10,000 workstations and servers and prevent ransomware attacks. In their evaluations, Traps performed better than both their existing antivirus and endpoint security products combined.
  • 0
  • 870

Securing the Unpatchable in Financial Services

Learn how unpatched and even end-of-support financial industry systems and devices may be secured with advanced endpoint protection against both malware and exploits.
  • 4
  • 428

How the Next-Generation Security Platform Contributes to GDPR Compliance

Palo Alto Networks Next-Generation Security Platform can help with security and data protection efforts related to GDPR compliance by securing personal data.
  • 1
  • 3410

A Smarter Approach for MSSPs

Security helps businesses increase productivity by safely enabling applications, cloud services, mobility, and the use of connected "things". However, many organizations lack the cybersecurity skills, automation, and resources needed to keep up with today's rapidly evolving security threats. This is driving demand for Managed Security Service Providers (MSSP's) to deliver security that helps their customers minimize their business risk, augment their IT security teams and secure their networks.
  • 0
  • 6

3 Requirements for Secure Digital Transformation

To secure digital transformation without slowing down the business requires an integrated approach – harnessing the agility of the cloud along with the power of automation and analytics – to simplify operations and bring about better security outcomes with less effort.
  • 0
  • 98

Cyber Threat Report: Reconnaissance 2.0

Learn the latest tactics that threat actors use to stay under the radar while conducting internal reconnaissance, as well as how automation has enabled amateur hackers to carry out advanced reconnaissance and accelerate the speed of attacks.
  • 0
  • 194

Actionable Security Intelligence

This white paper describes how Palo Alto Network next-generation firewalls and Panorama help you get actionable security insights.
  • 26
  • 14012

Cybersecurity Reference Blueprint for Financial Services IT

Learn how financial institutions may prevent successful cyberattacks by incorporating various elements of the Palo Alto Networks security operating platform into their overall cybersecurity program.
  • 3
  • 1644


Get more info about Palo Alto Networks Security Operating Platform
  • 0
  • 125

Mitigating Risk In Australia’s Critical Infrastructure

Palo Alto Networks Security Operating Platform Supports Use of ASD Top 37 STRATEGIES TO MITIGATE CYBERSECURITY INCIDENTS
  • 0
  • 263

Look What's Riding your Network

A Deeper Look at Growing Threats to Mobile Networks and Subscribers
  • 1
  • 4312

Securing SAP Deployments on Azure

This whitepaper provides an overview of how the VM-Series can be used to mitigate those security challenges for your SAP deployments on Azure.
  • 0
  • 107

Build Consistent Security Throughout NFV Evolution

Download the use case for more information on NFV
  • 0
  • 109

12 Best Practices to Make Your AWS Configuration More Secure

Amazon® Web Services has been an advocate for strong cloud security since it launched in 2006. AWS® and its customers employ a shared responsibility model that distributes security roles between the provider and customer. As a public cloud vendor, AWS owns the infrastructure, physical network and hypervisor. The enterprise owns the workload operating system, apps, virtual network, access to their tenant environment/account and the data.
  • 0
  • 123

Evident at Work: Continuous Security & Compliance in the Cloud

Evident from Palo Alto Networks® works with InfoSec and DevOps professionals of all levels, across every industry, to make cloud infrastructure security and compliance easier. Every organization struggles with the challenges of cloud security, such as threat detection, misconfiguration management, risk remediation and compliance with industry standards.
  • 0
  • 3158

The Six Essentials for DevOps Excellence

Moving at the speed of DevOps and digital transformation raises the concern that costly mistakes might happen. The worry is that as processes are trimmed or skipped, and decisions are done rapidly and in an environment that embraces agility, compromises and security gaffes will be made. Unfortunately, this is what appears to be happening in many organizations: a recent report from HPE concluded that while DevOps teams and automation should improve application security over time, most organizations are not currently paying enough attention to security.
  • 0
  • 55

Enhance your Windows 10 desktop security with Palo Alto Networks Advanced Endpoint Protection

The limitations of the built-in security features leave systems still highly vulnerable to advanced and unknown threats, also known as zero-day threats. To protect these systems and to fully protect your Windows 10 machines you need to augment the inbuilt security with security tools that can protect against attacks like exploits and ransomware.
  • 0
  • 185

Cybersecurity for Retail

Prevent successful cyberattacks on retail stores, secure customer data, maintain PCI compliance, simplify retail security operations
  • 1
  • 1155

Guide to Securing Microsoft Office 365 for the Enterprise

This paper describes how the Palo Alto Networks Security Operating platform secures your data in Microsoft Office 365 and other cloud applications.
  • 4
  • 923

App-IDs for Industrial Control Systems and SCADA Networks

View a listing of the application identifiers, or App-IDs, supported by the Palo Alto Networks Next-Generation Firewall for Industrial Control Systems (ICS).
  • 2
  • 1551

Cybersecurity Reference Blueprint for Building Management/Automation Systems

Learn how to protect your Building Management Systems for cyberthreats. Register to access the cybersecurity reference blueprint for BMS/BAS.
  • 0
  • 103

Electric Transmission Data Networks Use Case White Paper

This use case provides a high-level reference design for network security in electric transmission data networks.
  • 1
  • 628

How to Secure Your Business in a Multi-Cloud World

This paper highlights an innovative security approach that eliminates the wide range of cloud risks that can cause breaches, while enabling organizations to achieve consistent and frictionless cloud protections for multi-cloud environments.
  • 2
  • 2500

Palo Alto Networks Traps - a Key Tool for GDPR Compliance

The General Data Protection Regulation (GDPR) is a new data protection regulation from the European Union. GDPR aims to improve controls for protecting the personal information of EU residents.
  • 1
  • 4620

Stop Targeted Attacks Without Decrypting Traffic

Read this paper to learn how Magnifier detects active attacks without needing to decrypt traffic and how it works in concert with Palo Alto Networks Security Operating Platform to eradicate threats in SSL traffic.
  • 0
  • 4393

2018 NSS Labs Advanced Endpoint Protection Report

Palo Alto Networks advanced endpoint protect Traps achieved the rating of “Recommend” in the 2018 NSS Labs Advanced Endpoint Protection (AEP) Test. This test aims to determine how effectively the AEP product can protect against a threat, regardless of the infection vector or method of obfuscation. The AEP test evaluated several vendors ability to detect, prevent, continuously monitor and take action against malware, exploits, evasions and blended threats.
  • 3
  • 5037

Next-Generation Security Platform on VMware NSX Reference Architecture

This architecture document provides implementation guidelines for deploying Palo Alto Networks® virtualized VM-series next generation firewalls within VMware NSX powered software-defined data center.
  • 0
  • 4373
Displaying 1 to 30 of 173